Feb 13 05:24:07.549804 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 05:24:07.549817 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 05:24:07.549824 kernel: BIOS-provided physical RAM map: Feb 13 05:24:07.549828 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 05:24:07.549831 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 05:24:07.549835 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 05:24:07.549840 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 05:24:07.549844 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 05:24:07.549847 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cffff] usable Feb 13 05:24:07.549851 kernel: BIOS-e820: [mem 0x00000000819d0000-0x00000000819d0fff] ACPI NVS Feb 13 05:24:07.549856 kernel: BIOS-e820: [mem 0x00000000819d1000-0x00000000819d1fff] reserved Feb 13 05:24:07.549860 kernel: BIOS-e820: [mem 0x00000000819d2000-0x000000008afccfff] usable Feb 13 05:24:07.549863 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 05:24:07.549867 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 05:24:07.549872 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 05:24:07.549878 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 05:24:07.549882 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 05:24:07.549886 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 05:24:07.549890 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 05:24:07.549894 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 05:24:07.549898 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 05:24:07.549902 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 05:24:07.549907 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 05:24:07.549911 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 05:24:07.549915 kernel: NX (Execute Disable) protection: active Feb 13 05:24:07.549919 kernel: SMBIOS 3.2.1 present. Feb 13 05:24:07.549924 kernel: DMI: Supermicro Super Server/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 05:24:07.549928 kernel: tsc: Detected 3400.000 MHz processor Feb 13 05:24:07.549932 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 05:24:07.549937 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 05:24:07.549942 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 05:24:07.549946 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 05:24:07.549950 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 05:24:07.549955 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 05:24:07.549959 kernel: Using GB pages for direct mapping Feb 13 05:24:07.549963 kernel: ACPI: Early table checksum verification disabled Feb 13 05:24:07.549968 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 05:24:07.549973 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 05:24:07.549977 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 05:24:07.549981 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 05:24:07.549988 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 05:24:07.549992 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 05:24:07.549998 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 05:24:07.550003 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 05:24:07.550007 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 05:24:07.550012 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 05:24:07.550017 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 05:24:07.550021 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 05:24:07.550026 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 05:24:07.550031 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 05:24:07.550036 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 05:24:07.550041 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 05:24:07.550045 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 05:24:07.550050 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 05:24:07.550055 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 05:24:07.550059 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 05:24:07.550064 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 05:24:07.550069 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 05:24:07.550074 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 05:24:07.550079 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 05:24:07.550084 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 05:24:07.550088 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 05:24:07.550093 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 05:24:07.550098 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 05:24:07.550102 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 05:24:07.550107 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 05:24:07.550112 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 05:24:07.550117 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 05:24:07.550122 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 05:24:07.550126 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 05:24:07.550131 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 05:24:07.550136 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 05:24:07.550140 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 05:24:07.550145 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 05:24:07.550150 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 05:24:07.550155 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 05:24:07.550160 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 05:24:07.550164 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 05:24:07.550169 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 05:24:07.550174 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 05:24:07.550178 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 05:24:07.550183 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 05:24:07.550187 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 05:24:07.550192 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 05:24:07.550198 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 05:24:07.550202 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 05:24:07.550207 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 05:24:07.550211 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 05:24:07.550216 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 05:24:07.550221 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 05:24:07.550225 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 05:24:07.550230 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 05:24:07.550234 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 05:24:07.550240 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 05:24:07.550245 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 05:24:07.550249 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 05:24:07.550254 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 05:24:07.550258 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 05:24:07.550263 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 05:24:07.550268 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 05:24:07.550272 kernel: No NUMA configuration found Feb 13 05:24:07.550277 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 05:24:07.550282 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 05:24:07.550287 kernel: Zone ranges: Feb 13 05:24:07.550292 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 05:24:07.550297 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 05:24:07.550301 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 05:24:07.550306 kernel: Movable zone start for each node Feb 13 05:24:07.550310 kernel: Early memory node ranges Feb 13 05:24:07.550315 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 05:24:07.550320 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 05:24:07.550324 kernel: node 0: [mem 0x0000000040400000-0x00000000819cffff] Feb 13 05:24:07.550330 kernel: node 0: [mem 0x00000000819d2000-0x000000008afccfff] Feb 13 05:24:07.550334 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 05:24:07.550339 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 05:24:07.550344 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 05:24:07.550348 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 05:24:07.550353 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 05:24:07.550361 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 05:24:07.550367 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 05:24:07.550372 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 05:24:07.550377 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 05:24:07.550383 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 05:24:07.550388 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 05:24:07.550393 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 05:24:07.550398 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 05:24:07.550403 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 05:24:07.550410 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 05:24:07.550415 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 05:24:07.550421 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 05:24:07.550426 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 05:24:07.550431 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 05:24:07.550436 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 05:24:07.550441 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 05:24:07.550446 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 05:24:07.550451 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 05:24:07.550456 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 05:24:07.550461 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 05:24:07.550467 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 05:24:07.550472 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 05:24:07.550477 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 05:24:07.550482 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 05:24:07.550487 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 05:24:07.550492 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 05:24:07.550497 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 05:24:07.550502 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 05:24:07.550507 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 05:24:07.550512 kernel: TSC deadline timer available Feb 13 05:24:07.550517 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 05:24:07.550523 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 05:24:07.550528 kernel: Booting paravirtualized kernel on bare hardware Feb 13 05:24:07.550533 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 05:24:07.550538 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 05:24:07.550543 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 05:24:07.550548 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 05:24:07.550553 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 05:24:07.550558 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 05:24:07.550563 kernel: Policy zone: Normal Feb 13 05:24:07.550569 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 05:24:07.550574 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 05:24:07.550579 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 05:24:07.550584 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 05:24:07.550589 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 05:24:07.550595 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 05:24:07.550601 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 05:24:07.550606 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 05:24:07.550611 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 05:24:07.550616 kernel: rcu: Hierarchical RCU implementation. Feb 13 05:24:07.550621 kernel: rcu: RCU event tracing is enabled. Feb 13 05:24:07.550626 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 05:24:07.550631 kernel: Rude variant of Tasks RCU enabled. Feb 13 05:24:07.550636 kernel: Tracing variant of Tasks RCU enabled. Feb 13 05:24:07.550642 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 05:24:07.550647 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 05:24:07.550652 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 05:24:07.550657 kernel: random: crng init done Feb 13 05:24:07.550662 kernel: Console: colour dummy device 80x25 Feb 13 05:24:07.550667 kernel: printk: console [tty0] enabled Feb 13 05:24:07.550672 kernel: printk: console [ttyS1] enabled Feb 13 05:24:07.550677 kernel: ACPI: Core revision 20210730 Feb 13 05:24:07.550683 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 05:24:07.550688 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 05:24:07.550693 kernel: DMAR: Host address width 39 Feb 13 05:24:07.550698 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 05:24:07.550703 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 05:24:07.550708 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 05:24:07.550713 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 05:24:07.550718 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 05:24:07.550723 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 05:24:07.550728 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 05:24:07.550733 kernel: x2apic enabled Feb 13 05:24:07.550739 kernel: Switched APIC routing to cluster x2apic. Feb 13 05:24:07.550744 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 05:24:07.550749 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 05:24:07.550754 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 05:24:07.550759 kernel: process: using mwait in idle threads Feb 13 05:24:07.550764 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 05:24:07.550769 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 05:24:07.550774 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 05:24:07.550779 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 05:24:07.550785 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 05:24:07.550790 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 05:24:07.550795 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 05:24:07.550800 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 05:24:07.550804 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 05:24:07.550809 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 05:24:07.550814 kernel: TAA: Mitigation: TSX disabled Feb 13 05:24:07.550819 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 05:24:07.550824 kernel: SRBDS: Mitigation: Microcode Feb 13 05:24:07.550829 kernel: GDS: Vulnerable: No microcode Feb 13 05:24:07.550834 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 05:24:07.550840 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 05:24:07.550845 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 05:24:07.550850 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 05:24:07.550855 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 05:24:07.550860 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 05:24:07.550864 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 05:24:07.550869 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 05:24:07.550874 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 05:24:07.550879 kernel: Freeing SMP alternatives memory: 32K Feb 13 05:24:07.550884 kernel: pid_max: default: 32768 minimum: 301 Feb 13 05:24:07.550889 kernel: LSM: Security Framework initializing Feb 13 05:24:07.550894 kernel: SELinux: Initializing. Feb 13 05:24:07.550900 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 05:24:07.550905 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 05:24:07.550910 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 05:24:07.550915 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 05:24:07.550919 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 05:24:07.550924 kernel: ... version: 4 Feb 13 05:24:07.550929 kernel: ... bit width: 48 Feb 13 05:24:07.550934 kernel: ... generic registers: 4 Feb 13 05:24:07.550939 kernel: ... value mask: 0000ffffffffffff Feb 13 05:24:07.550944 kernel: ... max period: 00007fffffffffff Feb 13 05:24:07.550950 kernel: ... fixed-purpose events: 3 Feb 13 05:24:07.550955 kernel: ... event mask: 000000070000000f Feb 13 05:24:07.550960 kernel: signal: max sigframe size: 2032 Feb 13 05:24:07.550965 kernel: rcu: Hierarchical SRCU implementation. Feb 13 05:24:07.550970 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 05:24:07.550975 kernel: smp: Bringing up secondary CPUs ... Feb 13 05:24:07.550980 kernel: x86: Booting SMP configuration: Feb 13 05:24:07.550985 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 05:24:07.550990 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 05:24:07.550996 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 05:24:07.551001 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 05:24:07.551006 kernel: smpboot: Max logical packages: 1 Feb 13 05:24:07.551011 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 05:24:07.551016 kernel: devtmpfs: initialized Feb 13 05:24:07.551021 kernel: x86/mm: Memory block size: 128MB Feb 13 05:24:07.551026 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819d0000-0x819d0fff] (4096 bytes) Feb 13 05:24:07.551031 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 05:24:07.551037 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 05:24:07.551042 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 05:24:07.551047 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 05:24:07.551052 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 05:24:07.551057 kernel: audit: initializing netlink subsys (disabled) Feb 13 05:24:07.551062 kernel: audit: type=2000 audit(1707801842.040:1): state=initialized audit_enabled=0 res=1 Feb 13 05:24:07.551067 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 05:24:07.551072 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 05:24:07.551077 kernel: cpuidle: using governor menu Feb 13 05:24:07.551083 kernel: ACPI: bus type PCI registered Feb 13 05:24:07.551088 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 05:24:07.551093 kernel: dca service started, version 1.12.1 Feb 13 05:24:07.551098 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 05:24:07.551103 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 05:24:07.551108 kernel: PCI: Using configuration type 1 for base access Feb 13 05:24:07.551113 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 05:24:07.551118 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 05:24:07.551123 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 05:24:07.551128 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 05:24:07.551133 kernel: ACPI: Added _OSI(Module Device) Feb 13 05:24:07.551138 kernel: ACPI: Added _OSI(Processor Device) Feb 13 05:24:07.551143 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 05:24:07.551148 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 05:24:07.551153 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 05:24:07.551158 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 05:24:07.551163 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 05:24:07.551168 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 05:24:07.551174 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551179 kernel: ACPI: SSDT 0xFFFF97E4C0213800 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 05:24:07.551184 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 05:24:07.551189 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551194 kernel: ACPI: SSDT 0xFFFF97E4C1AE0800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 05:24:07.551199 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551204 kernel: ACPI: SSDT 0xFFFF97E4C1A5C800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 05:24:07.551209 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551214 kernel: ACPI: SSDT 0xFFFF97E4C1A59800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 05:24:07.551219 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551224 kernel: ACPI: SSDT 0xFFFF97E4C014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 05:24:07.551229 kernel: ACPI: Dynamic OEM Table Load: Feb 13 05:24:07.551234 kernel: ACPI: SSDT 0xFFFF97E4C1AE0C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 05:24:07.551239 kernel: ACPI: Interpreter enabled Feb 13 05:24:07.551244 kernel: ACPI: PM: (supports S0 S5) Feb 13 05:24:07.551249 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 05:24:07.551254 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 05:24:07.551259 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 05:24:07.551264 kernel: HEST: Table parsing has been initialized. Feb 13 05:24:07.551270 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 05:24:07.551275 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 05:24:07.551280 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 05:24:07.551285 kernel: ACPI: PM: Power Resource [USBC] Feb 13 05:24:07.551290 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 05:24:07.551295 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 05:24:07.551300 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 05:24:07.551304 kernel: ACPI: PM: Power Resource [WRST] Feb 13 05:24:07.551309 kernel: ACPI: PM: Power Resource [FN00] Feb 13 05:24:07.551315 kernel: ACPI: PM: Power Resource [FN01] Feb 13 05:24:07.551320 kernel: ACPI: PM: Power Resource [FN02] Feb 13 05:24:07.551325 kernel: ACPI: PM: Power Resource [FN03] Feb 13 05:24:07.551330 kernel: ACPI: PM: Power Resource [FN04] Feb 13 05:24:07.551335 kernel: ACPI: PM: Power Resource [PIN] Feb 13 05:24:07.551340 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 05:24:07.551408 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 05:24:07.551454 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 05:24:07.551497 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 05:24:07.551504 kernel: PCI host bridge to bus 0000:00 Feb 13 05:24:07.551547 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 05:24:07.551584 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 05:24:07.551620 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 05:24:07.551657 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 05:24:07.551692 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 05:24:07.551730 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 05:24:07.551780 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 05:24:07.551829 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 05:24:07.551873 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.551918 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 05:24:07.551961 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 05:24:07.552009 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 05:24:07.552051 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 05:24:07.552096 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 05:24:07.552138 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 05:24:07.552180 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 05:24:07.552226 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 05:24:07.552270 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 05:24:07.552312 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 05:24:07.552356 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 05:24:07.552397 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 05:24:07.552447 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 05:24:07.552488 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 05:24:07.552535 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 05:24:07.552576 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 05:24:07.552617 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 05:24:07.552662 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 05:24:07.552704 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 05:24:07.552745 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 05:24:07.552788 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 05:24:07.552831 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 05:24:07.552872 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 05:24:07.552916 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 05:24:07.552957 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 05:24:07.552998 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 05:24:07.553038 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 05:24:07.553078 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 05:24:07.553127 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 05:24:07.553169 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 05:24:07.553210 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 05:24:07.553255 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 05:24:07.553297 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.553342 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 05:24:07.553385 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.553437 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 05:24:07.553479 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.553525 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 05:24:07.553567 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.553613 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 05:24:07.553656 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.553701 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 05:24:07.553743 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 05:24:07.553788 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 05:24:07.553836 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 05:24:07.553877 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 05:24:07.553919 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 05:24:07.553964 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 05:24:07.554007 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 05:24:07.554054 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 05:24:07.554100 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 05:24:07.554142 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 05:24:07.554185 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 05:24:07.554228 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 05:24:07.554271 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 05:24:07.554319 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 05:24:07.554362 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 05:24:07.554409 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 05:24:07.554452 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 05:24:07.554494 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 05:24:07.554537 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 05:24:07.554579 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 05:24:07.554620 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 05:24:07.554663 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 05:24:07.554704 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 05:24:07.554753 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 05:24:07.554797 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 05:24:07.554839 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 05:24:07.554882 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 05:24:07.554927 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.554969 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 05:24:07.555012 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 05:24:07.555055 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 05:24:07.555101 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 05:24:07.555144 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 05:24:07.555187 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 05:24:07.555230 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 05:24:07.555272 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 05:24:07.555313 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 05:24:07.555354 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 05:24:07.555397 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 05:24:07.555443 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 05:24:07.555490 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 05:24:07.555534 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 05:24:07.555577 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 05:24:07.555622 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 05:24:07.555664 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 05:24:07.555706 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 05:24:07.555750 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 05:24:07.555798 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 05:24:07.555848 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 05:24:07.555894 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 05:24:07.555940 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 05:24:07.555985 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 05:24:07.556030 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 05:24:07.556077 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 05:24:07.556123 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 05:24:07.556198 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 05:24:07.556263 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 05:24:07.556306 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 05:24:07.556314 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 05:24:07.556320 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 05:24:07.556326 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 05:24:07.556332 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 05:24:07.556337 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 05:24:07.556343 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 05:24:07.556348 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 05:24:07.556354 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 05:24:07.556359 kernel: iommu: Default domain type: Translated Feb 13 05:24:07.556364 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 05:24:07.556411 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 05:24:07.556459 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 05:24:07.556504 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 05:24:07.556512 kernel: vgaarb: loaded Feb 13 05:24:07.556518 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 05:24:07.556524 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 05:24:07.556529 kernel: PTP clock support registered Feb 13 05:24:07.556534 kernel: PCI: Using ACPI for IRQ routing Feb 13 05:24:07.556540 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 05:24:07.556545 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 05:24:07.556552 kernel: e820: reserve RAM buffer [mem 0x819d0000-0x83ffffff] Feb 13 05:24:07.556557 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 05:24:07.556562 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 05:24:07.556567 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 05:24:07.556572 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 05:24:07.556578 kernel: clocksource: Switched to clocksource tsc-early Feb 13 05:24:07.556583 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 05:24:07.556589 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 05:24:07.556594 kernel: pnp: PnP ACPI init Feb 13 05:24:07.556637 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 05:24:07.556680 kernel: pnp 00:02: [dma 0 disabled] Feb 13 05:24:07.556720 kernel: pnp 00:03: [dma 0 disabled] Feb 13 05:24:07.556764 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 05:24:07.556801 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 05:24:07.556841 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 05:24:07.556884 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 05:24:07.556924 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 05:24:07.556962 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 05:24:07.556999 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 05:24:07.557036 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 05:24:07.557073 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 05:24:07.557111 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 05:24:07.557150 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 05:24:07.557191 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 05:24:07.557229 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 05:24:07.557266 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 05:24:07.557304 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 05:24:07.557341 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 05:24:07.557378 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 05:24:07.557420 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 05:24:07.557461 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 05:24:07.557470 kernel: pnp: PnP ACPI: found 10 devices Feb 13 05:24:07.557475 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 05:24:07.557481 kernel: NET: Registered PF_INET protocol family Feb 13 05:24:07.557486 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 05:24:07.557492 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 05:24:07.557497 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 05:24:07.557504 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 05:24:07.557509 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 05:24:07.557515 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 05:24:07.557520 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 05:24:07.557526 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 05:24:07.557531 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 05:24:07.557537 kernel: NET: Registered PF_XDP protocol family Feb 13 05:24:07.557579 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 05:24:07.557623 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 05:24:07.557665 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 05:24:07.557708 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 05:24:07.557753 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 05:24:07.557796 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 05:24:07.557839 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 05:24:07.557881 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 05:24:07.557923 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 05:24:07.557966 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 05:24:07.558008 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 05:24:07.558050 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 05:24:07.558092 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 05:24:07.558135 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 05:24:07.558178 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 05:24:07.558220 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 05:24:07.558261 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 05:24:07.558303 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 05:24:07.558346 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 05:24:07.558389 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 05:24:07.558435 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 05:24:07.558477 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 05:24:07.558521 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 05:24:07.558563 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 05:24:07.558601 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 05:24:07.558638 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 05:24:07.558675 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 05:24:07.558712 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 05:24:07.558748 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 05:24:07.558785 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 05:24:07.558827 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 05:24:07.558869 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 05:24:07.558914 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 05:24:07.558953 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 05:24:07.558996 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 05:24:07.559035 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 05:24:07.559077 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 05:24:07.559117 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 05:24:07.559159 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 05:24:07.559199 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 05:24:07.559207 kernel: PCI: CLS 64 bytes, default 64 Feb 13 05:24:07.559213 kernel: DMAR: No ATSR found Feb 13 05:24:07.559218 kernel: DMAR: No SATC found Feb 13 05:24:07.559224 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 05:24:07.559264 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 05:24:07.559310 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 05:24:07.559352 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 05:24:07.559394 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 05:24:07.559438 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 05:24:07.559480 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 05:24:07.559521 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 05:24:07.559563 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 05:24:07.559604 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 05:24:07.559647 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 05:24:07.559689 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 05:24:07.559730 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 05:24:07.559773 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 05:24:07.559814 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 05:24:07.559856 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 05:24:07.559898 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 05:24:07.559939 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 05:24:07.559983 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 05:24:07.560025 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 05:24:07.560068 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 05:24:07.560109 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 05:24:07.560154 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 05:24:07.560196 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 05:24:07.560240 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 05:24:07.560283 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 05:24:07.560329 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 05:24:07.560375 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 05:24:07.560383 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 05:24:07.560388 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 05:24:07.560394 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 05:24:07.560399 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 05:24:07.560405 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 05:24:07.560412 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 05:24:07.560419 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 05:24:07.560463 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 05:24:07.560472 kernel: Initialise system trusted keyrings Feb 13 05:24:07.560477 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 05:24:07.560482 kernel: Key type asymmetric registered Feb 13 05:24:07.560488 kernel: Asymmetric key parser 'x509' registered Feb 13 05:24:07.560493 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 05:24:07.560498 kernel: io scheduler mq-deadline registered Feb 13 05:24:07.560505 kernel: io scheduler kyber registered Feb 13 05:24:07.560511 kernel: io scheduler bfq registered Feb 13 05:24:07.560551 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 05:24:07.560593 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 05:24:07.560636 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 05:24:07.560677 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 05:24:07.560720 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 05:24:07.560761 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 05:24:07.560810 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 05:24:07.560819 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 05:24:07.560824 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 05:24:07.560830 kernel: pstore: Registered erst as persistent store backend Feb 13 05:24:07.560835 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 05:24:07.560841 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 05:24:07.560846 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 05:24:07.560852 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 05:24:07.560858 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 05:24:07.560903 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 05:24:07.560911 kernel: i8042: PNP: No PS/2 controller found. Feb 13 05:24:07.560948 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 05:24:07.560987 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 05:24:07.561025 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T05:24:06 UTC (1707801846) Feb 13 05:24:07.561063 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 05:24:07.561071 kernel: fail to initialize ptp_kvm Feb 13 05:24:07.561078 kernel: intel_pstate: Intel P-state driver initializing Feb 13 05:24:07.561083 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 05:24:07.561089 kernel: intel_pstate: HWP enabled Feb 13 05:24:07.561094 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 05:24:07.561099 kernel: vesafb: scrolling: redraw Feb 13 05:24:07.561105 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 05:24:07.561110 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000038159796, using 768k, total 768k Feb 13 05:24:07.561116 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 05:24:07.561121 kernel: fb0: VESA VGA frame buffer device Feb 13 05:24:07.561127 kernel: NET: Registered PF_INET6 protocol family Feb 13 05:24:07.561132 kernel: Segment Routing with IPv6 Feb 13 05:24:07.561138 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 05:24:07.561143 kernel: NET: Registered PF_PACKET protocol family Feb 13 05:24:07.561148 kernel: Key type dns_resolver registered Feb 13 05:24:07.561154 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 05:24:07.561159 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 05:24:07.561164 kernel: IPI shorthand broadcast: enabled Feb 13 05:24:07.561170 kernel: sched_clock: Marking stable (1732662429, 1339424838)->(4491259493, -1419172226) Feb 13 05:24:07.561176 kernel: registered taskstats version 1 Feb 13 05:24:07.561182 kernel: Loading compiled-in X.509 certificates Feb 13 05:24:07.561187 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 05:24:07.561192 kernel: Key type .fscrypt registered Feb 13 05:24:07.561197 kernel: Key type fscrypt-provisioning registered Feb 13 05:24:07.561203 kernel: pstore: Using crash dump compression: deflate Feb 13 05:24:07.561208 kernel: ima: Allocated hash algorithm: sha1 Feb 13 05:24:07.561213 kernel: ima: No architecture policies found Feb 13 05:24:07.561219 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 05:24:07.561225 kernel: Write protecting the kernel read-only data: 28672k Feb 13 05:24:07.561230 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 05:24:07.561236 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 05:24:07.561241 kernel: Run /init as init process Feb 13 05:24:07.561246 kernel: with arguments: Feb 13 05:24:07.561252 kernel: /init Feb 13 05:24:07.561257 kernel: with environment: Feb 13 05:24:07.561263 kernel: HOME=/ Feb 13 05:24:07.561268 kernel: TERM=linux Feb 13 05:24:07.561274 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 05:24:07.561280 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 05:24:07.561287 systemd[1]: Detected architecture x86-64. Feb 13 05:24:07.561293 systemd[1]: Running in initrd. Feb 13 05:24:07.561298 systemd[1]: No hostname configured, using default hostname. Feb 13 05:24:07.561303 systemd[1]: Hostname set to . Feb 13 05:24:07.561309 systemd[1]: Initializing machine ID from random generator. Feb 13 05:24:07.561315 systemd[1]: Queued start job for default target initrd.target. Feb 13 05:24:07.561321 systemd[1]: Started systemd-ask-password-console.path. Feb 13 05:24:07.561326 systemd[1]: Reached target cryptsetup.target. Feb 13 05:24:07.561332 systemd[1]: Reached target paths.target. Feb 13 05:24:07.561337 systemd[1]: Reached target slices.target. Feb 13 05:24:07.561342 systemd[1]: Reached target swap.target. Feb 13 05:24:07.561348 systemd[1]: Reached target timers.target. Feb 13 05:24:07.561353 systemd[1]: Listening on iscsid.socket. Feb 13 05:24:07.561360 systemd[1]: Listening on iscsiuio.socket. Feb 13 05:24:07.561366 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 05:24:07.561371 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 05:24:07.561377 systemd[1]: Listening on systemd-journald.socket. Feb 13 05:24:07.561382 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 13 05:24:07.561388 systemd[1]: Listening on systemd-networkd.socket. Feb 13 05:24:07.561393 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 13 05:24:07.561399 kernel: clocksource: Switched to clocksource tsc Feb 13 05:24:07.561405 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 05:24:07.561412 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 05:24:07.561418 systemd[1]: Reached target sockets.target. Feb 13 05:24:07.561424 systemd[1]: Starting kmod-static-nodes.service... Feb 13 05:24:07.561429 systemd[1]: Finished network-cleanup.service. Feb 13 05:24:07.561435 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 05:24:07.561440 systemd[1]: Starting systemd-journald.service... Feb 13 05:24:07.561446 systemd[1]: Starting systemd-modules-load.service... Feb 13 05:24:07.561453 systemd-journald[267]: Journal started Feb 13 05:24:07.561479 systemd-journald[267]: Runtime Journal (/run/log/journal/f5e1632166fb48408212f4b0223b5cd7) is 8.0M, max 640.1M, 632.1M free. Feb 13 05:24:07.565023 systemd-modules-load[268]: Inserted module 'overlay' Feb 13 05:24:07.570000 audit: BPF prog-id=6 op=LOAD Feb 13 05:24:07.589458 kernel: audit: type=1334 audit(1707801847.570:2): prog-id=6 op=LOAD Feb 13 05:24:07.589473 systemd[1]: Starting systemd-resolved.service... Feb 13 05:24:07.640451 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 05:24:07.640485 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 05:24:07.672451 kernel: Bridge firewalling registered Feb 13 05:24:07.672468 systemd[1]: Started systemd-journald.service. Feb 13 05:24:07.687028 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 13 05:24:07.737191 kernel: audit: type=1130 audit(1707801847.694:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.693373 systemd-resolved[270]: Positive Trust Anchors: Feb 13 05:24:07.800447 kernel: SCSI subsystem initialized Feb 13 05:24:07.800459 kernel: audit: type=1130 audit(1707801847.748:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.800469 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 05:24:07.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.693381 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 05:24:07.925610 kernel: device-mapper: uevent: version 1.0.3 Feb 13 05:24:07.925654 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 05:24:07.925683 kernel: audit: type=1130 audit(1707801847.869:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.693400 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 05:24:07.998643 kernel: audit: type=1130 audit(1707801847.932:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.694903 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 13 05:24:08.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.695695 systemd[1]: Started systemd-resolved.service. Feb 13 05:24:08.107056 kernel: audit: type=1130 audit(1707801848.006:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.107067 kernel: audit: type=1130 audit(1707801848.059:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:07.749605 systemd[1]: Finished kmod-static-nodes.service. Feb 13 05:24:07.870912 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 05:24:07.915414 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 13 05:24:07.933827 systemd[1]: Finished systemd-modules-load.service. Feb 13 05:24:08.007767 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 05:24:08.060710 systemd[1]: Reached target nss-lookup.target. Feb 13 05:24:08.116021 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 05:24:08.135972 systemd[1]: Starting systemd-sysctl.service... Feb 13 05:24:08.136258 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 05:24:08.139137 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 05:24:08.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.139836 systemd[1]: Finished systemd-sysctl.service. Feb 13 05:24:08.188616 kernel: audit: type=1130 audit(1707801848.137:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.200753 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 05:24:08.266506 kernel: audit: type=1130 audit(1707801848.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.258044 systemd[1]: Starting dracut-cmdline.service... Feb 13 05:24:08.281513 dracut-cmdline[291]: dracut-dracut-053 Feb 13 05:24:08.281513 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 05:24:08.281513 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 05:24:08.348444 kernel: Loading iSCSI transport class v2.0-870. Feb 13 05:24:08.348458 kernel: iscsi: registered transport (tcp) Feb 13 05:24:08.395784 kernel: iscsi: registered transport (qla4xxx) Feb 13 05:24:08.395805 kernel: QLogic iSCSI HBA Driver Feb 13 05:24:08.411939 systemd[1]: Finished dracut-cmdline.service. Feb 13 05:24:08.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:08.422157 systemd[1]: Starting dracut-pre-udev.service... Feb 13 05:24:08.477480 kernel: raid6: avx2x4 gen() 48105 MB/s Feb 13 05:24:08.512484 kernel: raid6: avx2x4 xor() 14737 MB/s Feb 13 05:24:08.547480 kernel: raid6: avx2x2 gen() 51880 MB/s Feb 13 05:24:08.582484 kernel: raid6: avx2x2 xor() 32110 MB/s Feb 13 05:24:08.617480 kernel: raid6: avx2x1 gen() 44475 MB/s Feb 13 05:24:08.651475 kernel: raid6: avx2x1 xor() 27920 MB/s Feb 13 05:24:08.685449 kernel: raid6: sse2x4 gen() 21383 MB/s Feb 13 05:24:08.719447 kernel: raid6: sse2x4 xor() 11799 MB/s Feb 13 05:24:08.753483 kernel: raid6: sse2x2 gen() 21673 MB/s Feb 13 05:24:08.787484 kernel: raid6: sse2x2 xor() 13416 MB/s Feb 13 05:24:08.821480 kernel: raid6: sse2x1 gen() 18298 MB/s Feb 13 05:24:08.873045 kernel: raid6: sse2x1 xor() 8932 MB/s Feb 13 05:24:08.873061 kernel: raid6: using algorithm avx2x2 gen() 51880 MB/s Feb 13 05:24:08.873069 kernel: raid6: .... xor() 32110 MB/s, rmw enabled Feb 13 05:24:08.891098 kernel: raid6: using avx2x2 recovery algorithm Feb 13 05:24:08.937412 kernel: xor: automatically using best checksumming function avx Feb 13 05:24:09.015416 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 05:24:09.020201 systemd[1]: Finished dracut-pre-udev.service. Feb 13 05:24:09.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:09.019000 audit: BPF prog-id=7 op=LOAD Feb 13 05:24:09.019000 audit: BPF prog-id=8 op=LOAD Feb 13 05:24:09.021070 systemd[1]: Starting systemd-udevd.service... Feb 13 05:24:09.028567 systemd-udevd[472]: Using default interface naming scheme 'v252'. Feb 13 05:24:09.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:09.040921 systemd[1]: Started systemd-udevd.service. Feb 13 05:24:09.079519 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Feb 13 05:24:09.057486 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 05:24:09.082394 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 05:24:09.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:09.102358 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 05:24:09.150326 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 05:24:09.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:09.179417 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 05:24:09.181416 kernel: libata version 3.00 loaded. Feb 13 05:24:09.198421 kernel: ACPI: bus type USB registered Feb 13 05:24:09.198502 kernel: usbcore: registered new interface driver usbfs Feb 13 05:24:09.234121 kernel: usbcore: registered new interface driver hub Feb 13 05:24:09.234165 kernel: usbcore: registered new device driver usb Feb 13 05:24:09.284599 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 05:24:09.284622 kernel: AES CTR mode by8 optimization enabled Feb 13 05:24:09.286415 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 05:24:09.297460 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 05:24:09.297537 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 05:24:09.297596 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 05:24:09.297647 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 05:24:09.315412 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 05:24:09.315534 kernel: scsi host0: ahci Feb 13 05:24:09.315606 kernel: scsi host1: ahci Feb 13 05:24:09.315680 kernel: scsi host2: ahci Feb 13 05:24:09.315780 kernel: scsi host3: ahci Feb 13 05:24:09.315831 kernel: scsi host4: ahci Feb 13 05:24:09.315885 kernel: scsi host5: ahci Feb 13 05:24:09.315937 kernel: scsi host6: ahci Feb 13 05:24:09.315989 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 13 05:24:09.315996 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 13 05:24:09.316003 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 13 05:24:09.316009 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 13 05:24:09.316015 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 13 05:24:09.316023 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 13 05:24:09.316031 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 13 05:24:09.340702 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 05:24:09.361451 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 05:24:09.567453 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 05:24:09.567473 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 05:24:09.596363 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 05:24:09.596380 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 05:24:09.636418 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 05:24:09.636437 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 05:24:09.636526 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 05:24:09.640412 kernel: pps pps0: new PPS source ptp1 Feb 13 05:24:09.640495 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 05:24:09.640565 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 05:24:09.640627 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6a Feb 13 05:24:09.640687 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 05:24:09.640745 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 05:24:09.644410 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 05:24:09.655420 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 05:24:09.670388 kernel: hub 1-0:1.0: USB hub found Feb 13 05:24:09.670536 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 05:24:09.678410 kernel: pps pps1: new PPS source ptp2 Feb 13 05:24:09.678477 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 05:24:09.678542 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 05:24:09.678603 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6b Feb 13 05:24:09.678662 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 05:24:09.678719 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 05:24:09.686425 kernel: hub 1-0:1.0: 16 ports detected Feb 13 05:24:09.698448 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 05:24:09.723453 kernel: hub 2-0:1.0: USB hub found Feb 13 05:24:09.723534 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 05:24:09.750551 kernel: hub 2-0:1.0: 10 ports detected Feb 13 05:24:09.750625 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 05:24:09.779135 kernel: usb: port power management may be unreliable Feb 13 05:24:09.779151 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 05:24:09.876493 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 05:24:09.876565 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 05:24:09.905487 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 05:24:09.905560 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 05:24:09.930840 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 05:24:09.943461 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 05:24:09.969998 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 05:24:09.970039 kernel: ata2.00: Features: NCQ-prio Feb 13 05:24:10.110458 kernel: hub 1-14:1.0: USB hub found Feb 13 05:24:10.110536 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 05:24:10.140521 kernel: hub 1-14:1.0: 4 ports detected Feb 13 05:24:10.140606 kernel: ata1.00: Features: NCQ-prio Feb 13 05:24:10.219443 kernel: ata2.00: configured for UDMA/133 Feb 13 05:24:10.219459 kernel: ata1.00: configured for UDMA/133 Feb 13 05:24:10.234440 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 05:24:10.253444 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 05:24:10.253511 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 05:24:10.291491 kernel: port_module: 9 callbacks suppressed Feb 13 05:24:10.291508 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 05:24:10.342412 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 05:24:10.362469 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 05:24:10.362485 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:10.377353 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 05:24:10.377441 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 05:24:10.378478 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 05:24:10.427641 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 05:24:10.427716 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 05:24:10.427773 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 05:24:10.427830 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 05:24:10.427883 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:10.427891 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 05:24:10.443467 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 05:24:10.443483 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 05:24:10.476820 kernel: GPT:9289727 != 937703087 Feb 13 05:24:10.476835 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 05:24:10.476842 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 05:24:10.491634 kernel: GPT:9289727 != 937703087 Feb 13 05:24:10.495468 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 05:24:10.506876 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 05:24:10.524347 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 05:24:10.524362 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 05:24:10.552463 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 05:24:10.568359 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 05:24:10.568440 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:10.697120 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 05:24:10.712479 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 05:24:10.727148 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 05:24:10.742414 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 05:24:10.771405 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 05:24:10.829576 kernel: usbcore: registered new interface driver usbhid Feb 13 05:24:10.829600 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (558) Feb 13 05:24:10.829614 kernel: usbhid: USB HID core driver Feb 13 05:24:10.829621 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 05:24:10.859786 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 05:24:10.865450 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 05:24:10.885499 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 13 05:24:10.892636 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 05:24:10.937494 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 13 05:24:10.937750 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 05:24:10.915220 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 05:24:11.028678 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 05:24:11.028692 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 05:24:11.021870 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 05:24:11.039253 systemd[1]: Starting disk-uuid.service... Feb 13 05:24:11.091509 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:11.091523 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 05:24:11.091530 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:11.091583 disk-uuid[689]: Primary Header is updated. Feb 13 05:24:11.091583 disk-uuid[689]: Secondary Entries is updated. Feb 13 05:24:11.091583 disk-uuid[689]: Secondary Header is updated. Feb 13 05:24:11.150497 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 05:24:11.150508 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:11.150515 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 05:24:12.136414 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 05:24:12.155413 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 05:24:12.156027 disk-uuid[690]: The operation has completed successfully. Feb 13 05:24:12.200314 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 05:24:12.291216 kernel: audit: type=1130 audit(1707801852.199:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.291232 kernel: audit: type=1131 audit(1707801852.199:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.200373 systemd[1]: Finished disk-uuid.service. Feb 13 05:24:12.321507 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 05:24:12.208412 systemd[1]: Starting verity-setup.service... Feb 13 05:24:12.366969 systemd[1]: Found device dev-mapper-usr.device. Feb 13 05:24:12.378700 systemd[1]: Mounting sysusr-usr.mount... Feb 13 05:24:12.391110 systemd[1]: Finished verity-setup.service. Feb 13 05:24:12.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.461415 kernel: audit: type=1130 audit(1707801852.404:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.519221 systemd[1]: Mounted sysusr-usr.mount. Feb 13 05:24:12.535596 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 05:24:12.527774 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 05:24:12.528172 systemd[1]: Starting ignition-setup.service... Feb 13 05:24:12.627459 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 05:24:12.627474 kernel: BTRFS info (device sda6): using free space tree Feb 13 05:24:12.627482 kernel: BTRFS info (device sda6): has skinny extents Feb 13 05:24:12.627488 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 05:24:12.536043 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 05:24:12.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.620312 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 05:24:12.743378 kernel: audit: type=1130 audit(1707801852.635:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.743391 kernel: audit: type=1130 audit(1707801852.693:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.636963 systemd[1]: Finished ignition-setup.service. Feb 13 05:24:12.751000 audit: BPF prog-id=9 op=LOAD Feb 13 05:24:12.695121 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 05:24:12.791497 kernel: audit: type=1334 audit(1707801852.751:24): prog-id=9 op=LOAD Feb 13 05:24:12.753788 systemd[1]: Starting systemd-networkd.service... Feb 13 05:24:12.791265 systemd-networkd[874]: lo: Link UP Feb 13 05:24:12.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.791267 systemd-networkd[874]: lo: Gained carrier Feb 13 05:24:12.875516 kernel: audit: type=1130 audit(1707801852.807:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.865242 ignition[866]: Ignition 2.14.0 Feb 13 05:24:12.791594 systemd-networkd[874]: Enumeration completed Feb 13 05:24:12.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.865246 ignition[866]: Stage: fetch-offline Feb 13 05:24:13.021934 kernel: audit: type=1130 audit(1707801852.887:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:13.022021 kernel: audit: type=1130 audit(1707801852.947:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:13.022029 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 05:24:12.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.791714 systemd[1]: Started systemd-networkd.service. Feb 13 05:24:13.046855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 05:24:12.865273 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:12.792366 systemd-networkd[874]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 05:24:13.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.865286 ignition[866]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:12.808605 systemd[1]: Reached target network.target. Feb 13 05:24:13.103501 iscsid[898]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 05:24:13.103501 iscsid[898]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 05:24:13.103501 iscsid[898]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 05:24:13.103501 iscsid[898]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 05:24:13.103501 iscsid[898]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 05:24:13.103501 iscsid[898]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 05:24:13.103501 iscsid[898]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 05:24:13.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:13.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:12.873498 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:12.869011 systemd[1]: Starting iscsiuio.service... Feb 13 05:24:12.873567 ignition[866]: parsed url from cmdline: "" Feb 13 05:24:12.877607 unknown[866]: fetched base config from "system" Feb 13 05:24:12.873569 ignition[866]: no config URL provided Feb 13 05:24:12.877611 unknown[866]: fetched user config from "system" Feb 13 05:24:12.873572 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 05:24:12.882713 systemd[1]: Started iscsiuio.service. Feb 13 05:24:12.873590 ignition[866]: parsing config with SHA512: f26e5b062e8369d922760cd8d65f81a6e2db16663d41f834139e1c4539b12cab5d7743ac4da320876c6d3e38e2e51a1834cfa9dfeab3acc032b559a5cc19b948 Feb 13 05:24:12.888765 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 05:24:12.877765 ignition[866]: fetch-offline: fetch-offline passed Feb 13 05:24:12.948661 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 05:24:13.353563 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 05:24:12.877768 ignition[866]: POST message to Packet Timeline Feb 13 05:24:12.949101 systemd[1]: Starting ignition-kargs.service... Feb 13 05:24:12.877773 ignition[866]: POST Status error: resource requires networking Feb 13 05:24:13.023591 systemd-networkd[874]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 05:24:12.877807 ignition[866]: Ignition finished successfully Feb 13 05:24:13.035978 systemd[1]: Starting iscsid.service... Feb 13 05:24:13.026168 ignition[888]: Ignition 2.14.0 Feb 13 05:24:13.058701 systemd[1]: Started iscsid.service. Feb 13 05:24:13.026171 ignition[888]: Stage: kargs Feb 13 05:24:13.076269 systemd[1]: Starting dracut-initqueue.service... Feb 13 05:24:13.026226 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:13.096750 systemd[1]: Finished dracut-initqueue.service. Feb 13 05:24:13.026235 ignition[888]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:13.111686 systemd[1]: Reached target remote-fs-pre.target. Feb 13 05:24:13.028909 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:13.130482 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 05:24:13.029319 ignition[888]: kargs: kargs passed Feb 13 05:24:13.130515 systemd[1]: Reached target remote-fs.target. Feb 13 05:24:13.029322 ignition[888]: POST message to Packet Timeline Feb 13 05:24:13.191151 systemd[1]: Starting dracut-pre-mount.service... Feb 13 05:24:13.029332 ignition[888]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 05:24:13.198751 systemd[1]: Finished dracut-pre-mount.service. Feb 13 05:24:13.032569 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40483->[::1]:53: read: connection refused Feb 13 05:24:13.340698 systemd-networkd[874]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 05:24:13.233016 ignition[888]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 05:24:13.368060 systemd-networkd[874]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 05:24:13.233757 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52031->[::1]:53: read: connection refused Feb 13 05:24:13.398339 systemd-networkd[874]: enp1s0f1np1: Link UP Feb 13 05:24:13.398782 systemd-networkd[874]: enp1s0f1np1: Gained carrier Feb 13 05:24:13.409915 systemd-networkd[874]: enp1s0f0np0: Link UP Feb 13 05:24:13.410272 systemd-networkd[874]: eno2: Link UP Feb 13 05:24:13.410639 systemd-networkd[874]: eno1: Link UP Feb 13 05:24:13.633939 ignition[888]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 05:24:13.635270 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44829->[::1]:53: read: connection refused Feb 13 05:24:14.058468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 05:24:14.058466 systemd-networkd[874]: enp1s0f0np0: Gained carrier Feb 13 05:24:14.105619 systemd-networkd[874]: enp1s0f0np0: DHCPv4 address 139.178.90.101/31, gateway 139.178.90.100 acquired from 145.40.83.140 Feb 13 05:24:14.435670 ignition[888]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 05:24:14.437027 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52760->[::1]:53: read: connection refused Feb 13 05:24:15.186861 systemd-networkd[874]: enp1s0f1np1: Gained IPv6LL Feb 13 05:24:15.378950 systemd-networkd[874]: enp1s0f0np0: Gained IPv6LL Feb 13 05:24:16.038683 ignition[888]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 05:24:16.039897 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60068->[::1]:53: read: connection refused Feb 13 05:24:19.243376 ignition[888]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 05:24:19.281397 ignition[888]: GET result: OK Feb 13 05:24:19.476122 ignition[888]: Ignition finished successfully Feb 13 05:24:19.480562 systemd[1]: Finished ignition-kargs.service. Feb 13 05:24:19.568338 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:24:19.568358 kernel: audit: type=1130 audit(1707801859.491:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:19.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:19.501247 ignition[917]: Ignition 2.14.0 Feb 13 05:24:19.494605 systemd[1]: Starting ignition-disks.service... Feb 13 05:24:19.501250 ignition[917]: Stage: disks Feb 13 05:24:19.501324 ignition[917]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:19.501333 ignition[917]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:19.503447 ignition[917]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:19.503878 ignition[917]: disks: disks passed Feb 13 05:24:19.503881 ignition[917]: POST message to Packet Timeline Feb 13 05:24:19.503891 ignition[917]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 05:24:19.526960 ignition[917]: GET result: OK Feb 13 05:24:19.777093 ignition[917]: Ignition finished successfully Feb 13 05:24:19.780154 systemd[1]: Finished ignition-disks.service. Feb 13 05:24:19.857427 kernel: audit: type=1130 audit(1707801859.791:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:19.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:19.793000 systemd[1]: Reached target initrd-root-device.target. Feb 13 05:24:19.865505 systemd[1]: Reached target local-fs-pre.target. Feb 13 05:24:19.881594 systemd[1]: Reached target local-fs.target. Feb 13 05:24:19.896605 systemd[1]: Reached target sysinit.target. Feb 13 05:24:19.911588 systemd[1]: Reached target basic.target. Feb 13 05:24:19.926626 systemd[1]: Starting systemd-fsck-root.service... Feb 13 05:24:19.952349 systemd-fsck[934]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 05:24:19.962933 systemd[1]: Finished systemd-fsck-root.service. Feb 13 05:24:20.055781 kernel: audit: type=1130 audit(1707801859.971:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.055794 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 05:24:19.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:19.975812 systemd[1]: Mounting sysroot.mount... Feb 13 05:24:20.063043 systemd[1]: Mounted sysroot.mount. Feb 13 05:24:20.076679 systemd[1]: Reached target initrd-root-fs.target. Feb 13 05:24:20.093254 systemd[1]: Mounting sysroot-usr.mount... Feb 13 05:24:20.108253 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 05:24:20.124326 systemd[1]: Starting flatcar-static-network.service... Feb 13 05:24:20.138628 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 05:24:20.138722 systemd[1]: Reached target ignition-diskful.target. Feb 13 05:24:20.158504 systemd[1]: Mounted sysroot-usr.mount. Feb 13 05:24:20.181909 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 05:24:20.192804 systemd[1]: Starting initrd-setup-root.service... Feb 13 05:24:20.313298 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (945) Feb 13 05:24:20.313313 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 05:24:20.313328 kernel: BTRFS info (device sda6): using free space tree Feb 13 05:24:20.313335 kernel: BTRFS info (device sda6): has skinny extents Feb 13 05:24:20.313342 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 05:24:20.243691 systemd[1]: Finished initrd-setup-root.service. Feb 13 05:24:20.374608 kernel: audit: type=1130 audit(1707801860.320:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.374726 coreos-metadata[942]: Feb 13 05:24:20.238 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 05:24:20.374726 coreos-metadata[942]: Feb 13 05:24:20.261 INFO Fetch successful Feb 13 05:24:20.560098 kernel: audit: type=1130 audit(1707801860.383:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.560184 kernel: audit: type=1130 audit(1707801860.446:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.560194 kernel: audit: type=1131 audit(1707801860.446:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.560248 coreos-metadata[941]: Feb 13 05:24:20.238 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 05:24:20.560248 coreos-metadata[941]: Feb 13 05:24:20.262 INFO Fetch successful Feb 13 05:24:20.560248 coreos-metadata[941]: Feb 13 05:24:20.279 INFO wrote hostname ci-3510.3.2-a-96d16e7f9b to /sysroot/etc/hostname Feb 13 05:24:20.609446 initrd-setup-root[952]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 05:24:20.322741 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 05:24:20.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.663630 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Feb 13 05:24:20.702627 kernel: audit: type=1130 audit(1707801860.634:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.384703 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 05:24:20.712658 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 05:24:20.384741 systemd[1]: Finished flatcar-static-network.service. Feb 13 05:24:20.730778 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 05:24:20.447666 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 05:24:20.748622 ignition[1017]: INFO : Ignition 2.14.0 Feb 13 05:24:20.748622 ignition[1017]: INFO : Stage: mount Feb 13 05:24:20.748622 ignition[1017]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:20.748622 ignition[1017]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:20.748622 ignition[1017]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:20.748622 ignition[1017]: INFO : mount: mount passed Feb 13 05:24:20.748622 ignition[1017]: INFO : POST message to Packet Timeline Feb 13 05:24:20.748622 ignition[1017]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 05:24:20.748622 ignition[1017]: INFO : GET result: OK Feb 13 05:24:20.569044 systemd[1]: Starting ignition-mount.service... Feb 13 05:24:20.596954 systemd[1]: Starting sysroot-boot.service... Feb 13 05:24:20.617137 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 05:24:20.617175 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 05:24:20.617756 systemd[1]: Finished sysroot-boot.service. Feb 13 05:24:20.928307 ignition[1017]: INFO : Ignition finished successfully Feb 13 05:24:20.930904 systemd[1]: Finished ignition-mount.service. Feb 13 05:24:20.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.003560 kernel: audit: type=1130 audit(1707801860.944:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:20.947485 systemd[1]: Starting ignition-files.service... Feb 13 05:24:21.012215 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 05:24:21.064538 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1030) Feb 13 05:24:21.064549 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 05:24:21.099742 kernel: BTRFS info (device sda6): using free space tree Feb 13 05:24:21.099759 kernel: BTRFS info (device sda6): has skinny extents Feb 13 05:24:21.149455 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 05:24:21.151660 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 05:24:21.169557 ignition[1049]: INFO : Ignition 2.14.0 Feb 13 05:24:21.169557 ignition[1049]: INFO : Stage: files Feb 13 05:24:21.169557 ignition[1049]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:21.169557 ignition[1049]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:21.169557 ignition[1049]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:21.169557 ignition[1049]: DEBUG : files: compiled without relabeling support, skipping Feb 13 05:24:21.169557 ignition[1049]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 05:24:21.169557 ignition[1049]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 05:24:21.288701 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1053) Feb 13 05:24:21.171167 unknown[1049]: wrote ssh authorized keys file for user: core Feb 13 05:24:21.297717 ignition[1049]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4256383543" Feb 13 05:24:21.297717 ignition[1049]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4256383543": device or resource busy Feb 13 05:24:21.297717 ignition[1049]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4256383543", trying btrfs: device or resource busy Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4256383543" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4256383543" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem4256383543" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem4256383543" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 05:24:21.297717 ignition[1049]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 05:24:21.656632 kernel: audit: type=1130 audit(1707801861.464:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.455986 systemd[1]: Finished ignition-files.service. Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 05:24:21.670619 ignition[1049]: INFO : files: files passed Feb 13 05:24:21.670619 ignition[1049]: INFO : POST message to Packet Timeline Feb 13 05:24:21.670619 ignition[1049]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 05:24:21.670619 ignition[1049]: INFO : GET result: OK Feb 13 05:24:21.670619 ignition[1049]: INFO : Ignition finished successfully Feb 13 05:24:21.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.471233 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 05:24:22.055856 initrd-setup-root-after-ignition[1082]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 05:24:21.533686 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 05:24:21.534029 systemd[1]: Starting ignition-quench.service... Feb 13 05:24:21.571802 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 05:24:22.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.595927 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 05:24:21.596030 systemd[1]: Finished ignition-quench.service. Feb 13 05:24:22.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.621966 systemd[1]: Reached target ignition-complete.target. Feb 13 05:24:22.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.645516 systemd[1]: Starting initrd-parse-etc.service... Feb 13 05:24:21.668988 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 05:24:21.669035 systemd[1]: Finished initrd-parse-etc.service. Feb 13 05:24:21.670727 systemd[1]: Reached target initrd-fs.target. Feb 13 05:24:21.696581 systemd[1]: Reached target initrd.target. Feb 13 05:24:22.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.713674 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 05:24:22.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.714962 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 05:24:22.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.751856 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 05:24:22.311519 ignition[1097]: INFO : Ignition 2.14.0 Feb 13 05:24:22.311519 ignition[1097]: INFO : Stage: umount Feb 13 05:24:22.311519 ignition[1097]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 05:24:22.311519 ignition[1097]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 05:24:22.311519 ignition[1097]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 05:24:22.311519 ignition[1097]: INFO : umount: umount passed Feb 13 05:24:22.311519 ignition[1097]: INFO : POST message to Packet Timeline Feb 13 05:24:22.311519 ignition[1097]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 05:24:22.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.781059 systemd[1]: Starting initrd-cleanup.service... Feb 13 05:24:22.456659 iscsid[898]: iscsid shutting down. Feb 13 05:24:22.471627 ignition[1097]: INFO : GET result: OK Feb 13 05:24:22.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.814464 systemd[1]: Stopped target nss-lookup.target. Feb 13 05:24:22.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.834102 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 05:24:22.517762 ignition[1097]: INFO : Ignition finished successfully Feb 13 05:24:21.856168 systemd[1]: Stopped target timers.target. Feb 13 05:24:21.876095 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 05:24:21.876482 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 05:24:22.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.898376 systemd[1]: Stopped target initrd.target. Feb 13 05:24:22.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.918103 systemd[1]: Stopped target basic.target. Feb 13 05:24:22.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.598000 audit: BPF prog-id=6 op=UNLOAD Feb 13 05:24:21.940112 systemd[1]: Stopped target ignition-complete.target. Feb 13 05:24:21.964105 systemd[1]: Stopped target ignition-diskful.target. Feb 13 05:24:22.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.979104 systemd[1]: Stopped target initrd-root-device.target. Feb 13 05:24:22.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:21.995117 systemd[1]: Stopped target remote-fs.target. Feb 13 05:24:22.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.014112 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 05:24:22.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.030121 systemd[1]: Stopped target sysinit.target. Feb 13 05:24:22.046126 systemd[1]: Stopped target local-fs.target. Feb 13 05:24:22.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.065115 systemd[1]: Stopped target local-fs-pre.target. Feb 13 05:24:22.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.087100 systemd[1]: Stopped target swap.target. Feb 13 05:24:22.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.110992 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 05:24:22.111354 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 05:24:22.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.128328 systemd[1]: Stopped target cryptsetup.target. Feb 13 05:24:22.143998 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 05:24:22.144354 systemd[1]: Stopped dracut-initqueue.service. Feb 13 05:24:22.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.161238 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 05:24:22.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.161615 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 05:24:22.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.176309 systemd[1]: Stopped target paths.target. Feb 13 05:24:22.190954 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 05:24:22.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.194604 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 05:24:22.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.207093 systemd[1]: Stopped target slices.target. Feb 13 05:24:22.222087 systemd[1]: Stopped target sockets.target. Feb 13 05:24:22.238101 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 05:24:22.238517 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 05:24:22.255209 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 05:24:22.255580 systemd[1]: Stopped ignition-files.service. Feb 13 05:24:22.270082 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 05:24:22.270437 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 05:24:22.291243 systemd[1]: Stopping ignition-mount.service... Feb 13 05:24:22.303689 systemd[1]: Stopping iscsid.service... Feb 13 05:24:22.319567 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 05:24:22.319745 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 05:24:22.327528 systemd[1]: Stopping sysroot-boot.service... Feb 13 05:24:22.345650 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 05:24:22.346166 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 05:24:22.384837 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 05:24:22.384943 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 05:24:22.399025 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 05:24:22.399936 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 05:24:22.400034 systemd[1]: Stopped iscsid.service. Feb 13 05:24:23.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:22.417728 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 05:24:22.417928 systemd[1]: Stopped sysroot-boot.service. Feb 13 05:24:22.433900 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 05:24:22.434156 systemd[1]: Closed iscsid.socket. Feb 13 05:24:22.449938 systemd[1]: Stopping iscsiuio.service... Feb 13 05:24:22.464233 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 05:24:22.464486 systemd[1]: Stopped iscsiuio.service. Feb 13 05:24:22.479430 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 05:24:22.479664 systemd[1]: Finished initrd-cleanup.service. Feb 13 05:24:22.495815 systemd[1]: Stopped target network.target. Feb 13 05:24:22.508766 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 05:24:22.508867 systemd[1]: Closed iscsiuio.socket. Feb 13 05:24:22.524950 systemd[1]: Stopping systemd-networkd.service... Feb 13 05:24:22.534577 systemd-networkd[874]: enp1s0f0np0: DHCPv6 lease lost Feb 13 05:24:22.539842 systemd[1]: Stopping systemd-resolved.service... Feb 13 05:24:22.542620 systemd-networkd[874]: enp1s0f1np1: DHCPv6 lease lost Feb 13 05:24:23.148000 audit: BPF prog-id=9 op=UNLOAD Feb 13 05:24:22.554294 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 05:24:22.554553 systemd[1]: Stopped systemd-resolved.service. Feb 13 05:24:22.570259 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 05:24:22.570588 systemd[1]: Stopped systemd-networkd.service. Feb 13 05:24:22.586149 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 05:24:22.586435 systemd[1]: Stopped ignition-mount.service. Feb 13 05:24:22.600051 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 05:24:22.600130 systemd[1]: Closed systemd-networkd.socket. Feb 13 05:24:22.614674 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 05:24:22.614792 systemd[1]: Stopped ignition-disks.service. Feb 13 05:24:22.630739 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 05:24:22.630851 systemd[1]: Stopped ignition-kargs.service. Feb 13 05:24:22.647733 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 05:24:22.647851 systemd[1]: Stopped ignition-setup.service. Feb 13 05:24:22.664817 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 05:24:22.664963 systemd[1]: Stopped initrd-setup-root.service. Feb 13 05:24:22.683461 systemd[1]: Stopping network-cleanup.service... Feb 13 05:24:22.696627 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 05:24:22.696776 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 05:24:23.150416 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 13 05:24:22.711798 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 05:24:22.711928 systemd[1]: Stopped systemd-sysctl.service. Feb 13 05:24:22.726885 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 05:24:22.727009 systemd[1]: Stopped systemd-modules-load.service. Feb 13 05:24:22.742133 systemd[1]: Stopping systemd-udevd.service... Feb 13 05:24:22.760306 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 05:24:22.761586 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 05:24:22.761642 systemd[1]: Stopped systemd-udevd.service. Feb 13 05:24:22.765880 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 05:24:22.765903 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 05:24:22.785764 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 05:24:22.785863 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 05:24:22.800689 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 05:24:22.800815 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 05:24:22.816846 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 05:24:22.816970 systemd[1]: Stopped dracut-cmdline.service. Feb 13 05:24:22.831764 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 05:24:22.831897 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 05:24:22.851266 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 05:24:22.865593 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 05:24:22.865739 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 05:24:22.881569 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 05:24:22.881794 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 05:24:23.059821 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 05:24:23.060066 systemd[1]: Stopped network-cleanup.service. Feb 13 05:24:23.068929 systemd[1]: Reached target initrd-switch-root.target. Feb 13 05:24:23.087235 systemd[1]: Starting initrd-switch-root.service... Feb 13 05:24:23.109083 systemd[1]: Switching root. Feb 13 05:24:23.150981 systemd-journald[267]: Journal stopped Feb 13 05:24:27.162873 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 05:24:27.162886 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 05:24:27.162895 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 05:24:27.162900 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 05:24:27.162905 kernel: SELinux: policy capability open_perms=1 Feb 13 05:24:27.162910 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 05:24:27.162916 kernel: SELinux: policy capability always_check_network=0 Feb 13 05:24:27.162922 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 05:24:27.162927 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 05:24:27.162933 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 05:24:27.162938 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 05:24:27.162944 systemd[1]: Successfully loaded SELinux policy in 304.797ms. Feb 13 05:24:27.162951 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.120ms. Feb 13 05:24:27.162957 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 05:24:27.162965 systemd[1]: Detected architecture x86-64. Feb 13 05:24:27.162971 systemd[1]: Detected first boot. Feb 13 05:24:27.162977 systemd[1]: Hostname set to . Feb 13 05:24:27.162983 systemd[1]: Initializing machine ID from random generator. Feb 13 05:24:27.162989 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 05:24:27.162994 systemd[1]: Populated /etc with preset unit settings. Feb 13 05:24:27.163000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 05:24:27.163008 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 05:24:27.163015 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 05:24:27.163021 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 13 05:24:27.163026 kernel: audit: type=1334 audit(1707801865.503:92): prog-id=12 op=LOAD Feb 13 05:24:27.163032 kernel: audit: type=1334 audit(1707801865.503:93): prog-id=3 op=UNLOAD Feb 13 05:24:27.163038 kernel: audit: type=1334 audit(1707801865.566:94): prog-id=13 op=LOAD Feb 13 05:24:27.163043 kernel: audit: type=1334 audit(1707801865.587:95): prog-id=14 op=LOAD Feb 13 05:24:27.163050 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 05:24:27.163056 kernel: audit: type=1334 audit(1707801865.587:96): prog-id=4 op=UNLOAD Feb 13 05:24:27.163061 systemd[1]: Stopped initrd-switch-root.service. Feb 13 05:24:27.163067 kernel: audit: type=1334 audit(1707801865.587:97): prog-id=5 op=UNLOAD Feb 13 05:24:27.163073 kernel: audit: type=1131 audit(1707801865.588:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.163079 kernel: audit: type=1130 audit(1707801865.742:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.163085 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 05:24:27.163092 kernel: audit: type=1131 audit(1707801865.742:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.163098 kernel: audit: type=1334 audit(1707801865.863:101): prog-id=12 op=UNLOAD Feb 13 05:24:27.163103 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 05:24:27.163109 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 05:24:27.163116 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 05:24:27.163123 systemd[1]: Created slice system-getty.slice. Feb 13 05:24:27.163130 systemd[1]: Created slice system-modprobe.slice. Feb 13 05:24:27.163136 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 05:24:27.163143 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 05:24:27.163149 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 05:24:27.163156 systemd[1]: Created slice user.slice. Feb 13 05:24:27.163162 systemd[1]: Started systemd-ask-password-console.path. Feb 13 05:24:27.163168 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 05:24:27.163174 systemd[1]: Set up automount boot.automount. Feb 13 05:24:27.163180 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 05:24:27.163186 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 05:24:27.163192 systemd[1]: Stopped target initrd-fs.target. Feb 13 05:24:27.163199 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 05:24:27.163206 systemd[1]: Reached target integritysetup.target. Feb 13 05:24:27.163212 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 05:24:27.163218 systemd[1]: Reached target remote-fs.target. Feb 13 05:24:27.163224 systemd[1]: Reached target slices.target. Feb 13 05:24:27.163230 systemd[1]: Reached target swap.target. Feb 13 05:24:27.163237 systemd[1]: Reached target torcx.target. Feb 13 05:24:27.163243 systemd[1]: Reached target veritysetup.target. Feb 13 05:24:27.163250 systemd[1]: Listening on systemd-coredump.socket. Feb 13 05:24:27.163256 systemd[1]: Listening on systemd-initctl.socket. Feb 13 05:24:27.163262 systemd[1]: Listening on systemd-networkd.socket. Feb 13 05:24:27.163269 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 05:24:27.163276 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 05:24:27.163282 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 05:24:27.163289 systemd[1]: Mounting dev-hugepages.mount... Feb 13 05:24:27.163295 systemd[1]: Mounting dev-mqueue.mount... Feb 13 05:24:27.163302 systemd[1]: Mounting media.mount... Feb 13 05:24:27.163309 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 05:24:27.163315 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 05:24:27.163321 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 05:24:27.163328 systemd[1]: Mounting tmp.mount... Feb 13 05:24:27.163335 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 05:24:27.163341 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 05:24:27.163348 systemd[1]: Starting kmod-static-nodes.service... Feb 13 05:24:27.163354 systemd[1]: Starting modprobe@configfs.service... Feb 13 05:24:27.163360 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 05:24:27.163366 systemd[1]: Starting modprobe@drm.service... Feb 13 05:24:27.163373 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 05:24:27.163379 systemd[1]: Starting modprobe@fuse.service... Feb 13 05:24:27.163385 kernel: fuse: init (API version 7.34) Feb 13 05:24:27.163392 systemd[1]: Starting modprobe@loop.service... Feb 13 05:24:27.163398 kernel: loop: module loaded Feb 13 05:24:27.163404 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 05:24:27.163414 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 05:24:27.163421 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 05:24:27.163427 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 05:24:27.163434 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 05:24:27.163440 systemd[1]: Stopped systemd-journald.service. Feb 13 05:24:27.163446 systemd[1]: Starting systemd-journald.service... Feb 13 05:24:27.163480 systemd[1]: Starting systemd-modules-load.service... Feb 13 05:24:27.163503 systemd-journald[1252]: Journal started Feb 13 05:24:27.163526 systemd-journald[1252]: Runtime Journal (/run/log/journal/dcfc89299c5c4e99a2e4eeb22328d72b) is 8.0M, max 640.1M, 632.1M free. Feb 13 05:24:23.587000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 05:24:23.872000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 05:24:23.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 05:24:23.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 05:24:23.874000 audit: BPF prog-id=10 op=LOAD Feb 13 05:24:23.874000 audit: BPF prog-id=10 op=UNLOAD Feb 13 05:24:23.875000 audit: BPF prog-id=11 op=LOAD Feb 13 05:24:23.875000 audit: BPF prog-id=11 op=UNLOAD Feb 13 05:24:23.944000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 05:24:23.944000 audit[1141]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d989c a1=c00015adf8 a2=c000163ac0 a3=32 items=0 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:23.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 05:24:23.968000 audit[1141]: AVC avc: denied { associate } for pid=1141 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 05:24:23.968000 audit[1141]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d9975 a2=1ed a3=0 items=2 ppid=1124 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:23.968000 audit: CWD cwd="/" Feb 13 05:24:23.968000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:23.968000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:23.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 05:24:25.503000 audit: BPF prog-id=12 op=LOAD Feb 13 05:24:25.503000 audit: BPF prog-id=3 op=UNLOAD Feb 13 05:24:25.566000 audit: BPF prog-id=13 op=LOAD Feb 13 05:24:25.587000 audit: BPF prog-id=14 op=LOAD Feb 13 05:24:25.587000 audit: BPF prog-id=4 op=UNLOAD Feb 13 05:24:25.587000 audit: BPF prog-id=5 op=UNLOAD Feb 13 05:24:25.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:25.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:25.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:25.863000 audit: BPF prog-id=12 op=UNLOAD Feb 13 05:24:27.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.134000 audit: BPF prog-id=15 op=LOAD Feb 13 05:24:27.135000 audit: BPF prog-id=16 op=LOAD Feb 13 05:24:27.135000 audit: BPF prog-id=17 op=LOAD Feb 13 05:24:27.135000 audit: BPF prog-id=13 op=UNLOAD Feb 13 05:24:27.135000 audit: BPF prog-id=14 op=UNLOAD Feb 13 05:24:27.159000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 05:24:27.159000 audit[1252]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff2a523330 a2=4000 a3=7fff2a5233cc items=0 ppid=1 pid=1252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:27.159000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 05:24:25.503167 systemd[1]: Queued start job for default target multi-user.target. Feb 13 05:24:23.943261 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 05:24:25.589360 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 05:24:23.943726 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 05:24:23.943741 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 05:24:23.943763 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 05:24:23.943770 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 05:24:23.943790 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 05:24:23.943798 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 05:24:23.943931 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 05:24:23.943959 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 05:24:23.943969 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 05:24:23.944582 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 05:24:23.944606 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 05:24:23.944618 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 05:24:23.944629 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 05:24:23.944640 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 05:24:23.944650 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 05:24:25.158520 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 05:24:25.158660 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 05:24:25.158718 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 05:24:25.158811 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 05:24:25.158841 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 05:24:25.158874 /usr/lib/systemd/system-generators/torcx-generator[1141]: time="2024-02-13T05:24:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 05:24:27.194600 systemd[1]: Starting systemd-network-generator.service... Feb 13 05:24:27.217518 systemd[1]: Starting systemd-remount-fs.service... Feb 13 05:24:27.240449 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 05:24:27.274024 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 05:24:27.274045 systemd[1]: Stopped verity-setup.service. Feb 13 05:24:27.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.308455 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 05:24:27.323597 systemd[1]: Started systemd-journald.service. Feb 13 05:24:27.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.330946 systemd[1]: Mounted dev-hugepages.mount. Feb 13 05:24:27.338674 systemd[1]: Mounted dev-mqueue.mount. Feb 13 05:24:27.345641 systemd[1]: Mounted media.mount. Feb 13 05:24:27.352668 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 05:24:27.361626 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 05:24:27.369616 systemd[1]: Mounted tmp.mount. Feb 13 05:24:27.376719 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 05:24:27.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.384754 systemd[1]: Finished kmod-static-nodes.service. Feb 13 05:24:27.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.393772 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 05:24:27.393895 systemd[1]: Finished modprobe@configfs.service. Feb 13 05:24:27.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.402981 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 05:24:27.403141 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 05:24:27.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.411976 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 05:24:27.412167 systemd[1]: Finished modprobe@drm.service. Feb 13 05:24:27.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.421243 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 05:24:27.421572 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 05:24:27.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.430269 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 05:24:27.430715 systemd[1]: Finished modprobe@fuse.service. Feb 13 05:24:27.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.440242 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 05:24:27.440570 systemd[1]: Finished modprobe@loop.service. Feb 13 05:24:27.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.449281 systemd[1]: Finished systemd-modules-load.service. Feb 13 05:24:27.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.458219 systemd[1]: Finished systemd-network-generator.service. Feb 13 05:24:27.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.467362 systemd[1]: Finished systemd-remount-fs.service. Feb 13 05:24:27.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.476257 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 05:24:27.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.485807 systemd[1]: Reached target network-pre.target. Feb 13 05:24:27.497250 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 05:24:27.508135 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 05:24:27.514791 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 05:24:27.518042 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 05:24:27.528888 systemd[1]: Starting systemd-journal-flush.service... Feb 13 05:24:27.537659 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 05:24:27.538176 systemd[1]: Starting systemd-random-seed.service... Feb 13 05:24:27.538265 systemd-journald[1252]: Time spent on flushing to /var/log/journal/dcfc89299c5c4e99a2e4eeb22328d72b is 14.744ms for 1552 entries. Feb 13 05:24:27.538265 systemd-journald[1252]: System Journal (/var/log/journal/dcfc89299c5c4e99a2e4eeb22328d72b) is 8.0M, max 195.6M, 187.6M free. Feb 13 05:24:27.581010 systemd-journald[1252]: Received client request to flush runtime journal. Feb 13 05:24:27.552543 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 05:24:27.553003 systemd[1]: Starting systemd-sysctl.service... Feb 13 05:24:27.563099 systemd[1]: Starting systemd-sysusers.service... Feb 13 05:24:27.570084 systemd[1]: Starting systemd-udev-settle.service... Feb 13 05:24:27.577548 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 05:24:27.585609 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 05:24:27.593634 systemd[1]: Finished systemd-journal-flush.service. Feb 13 05:24:27.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.601634 systemd[1]: Finished systemd-random-seed.service. Feb 13 05:24:27.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.609640 systemd[1]: Finished systemd-sysctl.service. Feb 13 05:24:27.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.617608 systemd[1]: Finished systemd-sysusers.service. Feb 13 05:24:27.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.626585 systemd[1]: Reached target first-boot-complete.target. Feb 13 05:24:27.634734 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 05:24:27.835823 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 05:24:27.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.843000 audit: BPF prog-id=18 op=LOAD Feb 13 05:24:27.843000 audit: BPF prog-id=19 op=LOAD Feb 13 05:24:27.844000 audit: BPF prog-id=7 op=UNLOAD Feb 13 05:24:27.844000 audit: BPF prog-id=8 op=UNLOAD Feb 13 05:24:27.845781 systemd[1]: Starting systemd-udevd.service... Feb 13 05:24:27.857415 systemd-udevd[1269]: Using default interface naming scheme 'v252'. Feb 13 05:24:27.876286 systemd[1]: Started systemd-udevd.service. Feb 13 05:24:27.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:27.886463 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 05:24:27.885000 audit: BPF prog-id=20 op=LOAD Feb 13 05:24:27.887680 systemd[1]: Starting systemd-networkd.service... Feb 13 05:24:27.906000 audit: BPF prog-id=21 op=LOAD Feb 13 05:24:27.920569 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 05:24:27.920865 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 05:24:27.919000 audit: BPF prog-id=22 op=LOAD Feb 13 05:24:27.919000 audit: BPF prog-id=23 op=LOAD Feb 13 05:24:27.921442 systemd[1]: Starting systemd-userdbd.service... Feb 13 05:24:27.929730 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 05:24:27.929785 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 05:24:27.929806 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1327) Feb 13 05:24:27.941819 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 05:24:27.990417 kernel: IPMI message handler: version 39.2 Feb 13 05:24:27.990472 kernel: ACPI: button: Power Button [PWRF] Feb 13 05:24:27.947000 audit[1334]: AVC avc: denied { confidentiality } for pid=1334 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 05:24:27.947000 audit[1334]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc17d8ec010 a1=df92c a2=7fc17f6a2bc5 a3=5 items=312 ppid=1269 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:27.947000 audit: CWD cwd="/" Feb 13 05:24:27.947000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=1 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=2 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=3 name=(null) inode=17703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=4 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=5 name=(null) inode=17704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=6 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=7 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=8 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=9 name=(null) inode=17706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=10 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=11 name=(null) inode=17707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=12 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=13 name=(null) inode=17708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=14 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=15 name=(null) inode=17709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=16 name=(null) inode=17705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=17 name=(null) inode=17710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=18 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=19 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=20 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=21 name=(null) inode=17712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=22 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=23 name=(null) inode=17713 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=24 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=25 name=(null) inode=17714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=26 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=27 name=(null) inode=17715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=28 name=(null) inode=17711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=29 name=(null) inode=17716 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=30 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=31 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=32 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=33 name=(null) inode=17718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=34 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=35 name=(null) inode=17719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=36 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=37 name=(null) inode=17720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=38 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=39 name=(null) inode=17721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=40 name=(null) inode=17717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=41 name=(null) inode=17722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=42 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=43 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=44 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=45 name=(null) inode=17724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=46 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=47 name=(null) inode=17725 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=48 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=49 name=(null) inode=17726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=50 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=51 name=(null) inode=17727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=52 name=(null) inode=17723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=53 name=(null) inode=17728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=54 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=55 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=56 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=57 name=(null) inode=17730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=58 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=59 name=(null) inode=17731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=60 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=61 name=(null) inode=17732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=62 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=63 name=(null) inode=17733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=64 name=(null) inode=17729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=65 name=(null) inode=17734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=66 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=67 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=68 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=69 name=(null) inode=17736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=70 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=71 name=(null) inode=17737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=72 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=73 name=(null) inode=17738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=74 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=75 name=(null) inode=17739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=76 name=(null) inode=17735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=77 name=(null) inode=17740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=78 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=79 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=80 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=81 name=(null) inode=17742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=82 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=83 name=(null) inode=17743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=84 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=85 name=(null) inode=17744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=86 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=87 name=(null) inode=17745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=88 name=(null) inode=17741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=89 name=(null) inode=17746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=90 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=91 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=92 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=93 name=(null) inode=17748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=94 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=95 name=(null) inode=17749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=96 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=97 name=(null) inode=17750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=98 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=99 name=(null) inode=17751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=100 name=(null) inode=17747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=101 name=(null) inode=17752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=102 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=103 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=104 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=105 name=(null) inode=17754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=106 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=107 name=(null) inode=17755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=108 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=109 name=(null) inode=17756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=110 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=111 name=(null) inode=17757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=112 name=(null) inode=17753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=113 name=(null) inode=17758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=114 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=115 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=116 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=117 name=(null) inode=17760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=118 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=119 name=(null) inode=17761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=120 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=121 name=(null) inode=17762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=122 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=123 name=(null) inode=17763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=124 name=(null) inode=17759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=125 name=(null) inode=17764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=126 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=127 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=128 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=129 name=(null) inode=17766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=130 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=131 name=(null) inode=17767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=132 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=133 name=(null) inode=17768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=134 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=135 name=(null) inode=17769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=136 name=(null) inode=17765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=137 name=(null) inode=17770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=138 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=139 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=140 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=141 name=(null) inode=17772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=142 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=143 name=(null) inode=17773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=144 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=145 name=(null) inode=17774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=146 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=147 name=(null) inode=17775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=148 name=(null) inode=17771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=149 name=(null) inode=17776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=150 name=(null) inode=17702 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=151 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=152 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=153 name=(null) inode=17778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=154 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=155 name=(null) inode=17779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=156 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=157 name=(null) inode=17780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=158 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=159 name=(null) inode=17781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=160 name=(null) inode=17777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=161 name=(null) inode=17782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=162 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=163 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=164 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=165 name=(null) inode=17784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=166 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=167 name=(null) inode=17785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=168 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=169 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=170 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=171 name=(null) inode=17787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=172 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=173 name=(null) inode=17788 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=174 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=175 name=(null) inode=17789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=176 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=177 name=(null) inode=17790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=178 name=(null) inode=17786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=179 name=(null) inode=17791 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=180 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=181 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=182 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=183 name=(null) inode=17793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=184 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=185 name=(null) inode=17794 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=186 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=187 name=(null) inode=17795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=188 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=189 name=(null) inode=17796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=190 name=(null) inode=17792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=191 name=(null) inode=17797 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=192 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=193 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=194 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=195 name=(null) inode=17799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=196 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=197 name=(null) inode=17800 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=198 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=199 name=(null) inode=17801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=200 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=201 name=(null) inode=17802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=202 name=(null) inode=17798 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=203 name=(null) inode=17803 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=204 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=205 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=206 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=207 name=(null) inode=17805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=208 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=209 name=(null) inode=17806 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=210 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=211 name=(null) inode=17807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=212 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=213 name=(null) inode=17808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=214 name=(null) inode=17804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=215 name=(null) inode=17809 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=216 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=217 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=218 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=219 name=(null) inode=17811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=220 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=221 name=(null) inode=17812 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=222 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=223 name=(null) inode=17813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=224 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=225 name=(null) inode=17814 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=226 name=(null) inode=17810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=227 name=(null) inode=17815 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=228 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=229 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=230 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=231 name=(null) inode=17817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=232 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=233 name=(null) inode=17818 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=234 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=235 name=(null) inode=17819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=236 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=237 name=(null) inode=17820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=238 name=(null) inode=17816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=239 name=(null) inode=17821 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=240 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=241 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=242 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=243 name=(null) inode=17823 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=244 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=245 name=(null) inode=17824 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=246 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=247 name=(null) inode=17825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=248 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=249 name=(null) inode=17826 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=250 name=(null) inode=17822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=251 name=(null) inode=17827 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=252 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=253 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=254 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=255 name=(null) inode=17829 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=256 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=257 name=(null) inode=17830 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=258 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=259 name=(null) inode=17831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=260 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=261 name=(null) inode=17832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=262 name=(null) inode=17828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=263 name=(null) inode=17833 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=264 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=265 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=266 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=267 name=(null) inode=17835 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=268 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=269 name=(null) inode=17836 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=270 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=271 name=(null) inode=17837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=272 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=273 name=(null) inode=17838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=274 name=(null) inode=17834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=275 name=(null) inode=17839 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=276 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=277 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=278 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=279 name=(null) inode=17841 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=280 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=281 name=(null) inode=17842 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=282 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=283 name=(null) inode=17843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=284 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=285 name=(null) inode=17844 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=286 name=(null) inode=17840 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=287 name=(null) inode=17845 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=288 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=289 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=290 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=291 name=(null) inode=17847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=292 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=293 name=(null) inode=17848 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=294 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=295 name=(null) inode=17849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=296 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=297 name=(null) inode=17850 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=298 name=(null) inode=17846 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=299 name=(null) inode=17851 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=300 name=(null) inode=17783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=301 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=302 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=303 name=(null) inode=17853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=304 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=305 name=(null) inode=17854 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=306 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=307 name=(null) inode=17855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=308 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=309 name=(null) inode=17856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=310 name=(null) inode=17852 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PATH item=311 name=(null) inode=17857 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 05:24:27.947000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 05:24:28.031417 kernel: ipmi device interface Feb 13 05:24:28.037418 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 05:24:28.048571 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 05:24:28.048897 kernel: ipmi_si: IPMI System Interface driver Feb 13 05:24:28.050415 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 05:24:28.050644 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 05:24:28.084831 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Feb 13 05:24:28.084936 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 05:24:28.148415 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 05:24:28.148451 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 05:24:28.148475 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 05:24:28.148566 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 05:24:28.224603 systemd[1]: Started systemd-userdbd.service. Feb 13 05:24:28.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.281543 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 05:24:28.281667 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 05:24:28.281699 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 05:24:28.318417 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 05:24:28.359413 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 05:24:28.359533 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 05:24:28.411422 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 05:24:28.411560 kernel: intel_rapl_common: Found RAPL domain package Feb 13 05:24:28.432781 systemd-networkd[1312]: bond0: netdev ready Feb 13 05:24:28.434899 systemd-networkd[1312]: lo: Link UP Feb 13 05:24:28.434901 systemd-networkd[1312]: lo: Gained carrier Feb 13 05:24:28.435370 systemd-networkd[1312]: Enumeration completed Feb 13 05:24:28.435446 systemd[1]: Started systemd-networkd.service. Feb 13 05:24:28.435652 systemd-networkd[1312]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 05:24:28.444060 kernel: intel_rapl_common: Found RAPL domain core Feb 13 05:24:28.444083 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 05:24:28.447126 systemd-networkd[1312]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:91.network. Feb 13 05:24:28.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.479167 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 05:24:28.481411 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 05:24:28.543413 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 05:24:28.560444 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 05:24:28.563672 systemd[1]: Finished systemd-udev-settle.service. Feb 13 05:24:28.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.572136 systemd[1]: Starting lvm2-activation-early.service... Feb 13 05:24:28.587820 lvm[1379]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 05:24:28.629825 systemd[1]: Finished lvm2-activation-early.service. Feb 13 05:24:28.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.638492 systemd[1]: Reached target cryptsetup.target. Feb 13 05:24:28.647049 systemd[1]: Starting lvm2-activation.service... Feb 13 05:24:28.649291 lvm[1380]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 05:24:28.692813 systemd[1]: Finished lvm2-activation.service. Feb 13 05:24:28.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.700498 systemd[1]: Reached target local-fs-pre.target. Feb 13 05:24:28.708450 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 05:24:28.708464 systemd[1]: Reached target local-fs.target. Feb 13 05:24:28.716476 systemd[1]: Reached target machines.target. Feb 13 05:24:28.725059 systemd[1]: Starting ldconfig.service... Feb 13 05:24:28.732156 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 05:24:28.732180 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 05:24:28.732801 systemd[1]: Starting systemd-boot-update.service... Feb 13 05:24:28.740001 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 05:24:28.750028 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 05:24:28.750169 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 05:24:28.750210 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 05:24:28.750911 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 05:24:28.751115 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1382 (bootctl) Feb 13 05:24:28.751895 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 05:24:28.764204 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 05:24:28.764593 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 05:24:28.766765 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 05:24:28.770479 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 05:24:28.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.770949 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 05:24:28.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.775234 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 05:24:28.822842 systemd-fsck[1390]: fsck.fat 4.2 (2021-01-31) Feb 13 05:24:28.822842 systemd-fsck[1390]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 05:24:28.823539 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 05:24:28.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.835291 systemd[1]: Mounting boot.mount... Feb 13 05:24:28.847185 systemd[1]: Mounted boot.mount. Feb 13 05:24:28.864931 systemd[1]: Finished systemd-boot-update.service. Feb 13 05:24:28.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.894647 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 05:24:28.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:28.903302 systemd[1]: Starting audit-rules.service... Feb 13 05:24:28.912007 systemd[1]: Starting clean-ca-certificates.service... Feb 13 05:24:28.921021 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 05:24:28.922000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 05:24:28.922000 audit[1409]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3902ee70 a2=420 a3=0 items=0 ppid=1393 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:28.922000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 05:24:28.924012 augenrules[1409]: No rules Feb 13 05:24:28.930394 systemd[1]: Starting systemd-resolved.service... Feb 13 05:24:28.938282 systemd[1]: Starting systemd-timesyncd.service... Feb 13 05:24:28.946021 systemd[1]: Starting systemd-update-utmp.service... Feb 13 05:24:28.952790 systemd[1]: Finished audit-rules.service. Feb 13 05:24:28.959626 systemd[1]: Finished clean-ca-certificates.service. Feb 13 05:24:28.967603 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 05:24:28.979390 systemd[1]: Finished systemd-update-utmp.service. Feb 13 05:24:28.987511 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 05:24:29.004800 systemd[1]: Started systemd-timesyncd.service. Feb 13 05:24:29.005073 ldconfig[1381]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 05:24:29.006688 systemd-resolved[1415]: Positive Trust Anchors: Feb 13 05:24:29.006694 systemd-resolved[1415]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 05:24:29.006711 systemd-resolved[1415]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 05:24:29.010804 systemd-resolved[1415]: Using system hostname 'ci-3510.3.2-a-96d16e7f9b'. Feb 13 05:24:29.013626 systemd[1]: Finished ldconfig.service. Feb 13 05:24:29.021493 systemd[1]: Reached target time-set.target. Feb 13 05:24:29.031113 systemd[1]: Starting systemd-update-done.service... Feb 13 05:24:29.038602 systemd[1]: Finished systemd-update-done.service. Feb 13 05:24:29.540463 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 05:24:29.564472 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 05:24:29.566575 systemd-networkd[1312]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 05:24:29.567157 systemd[1]: Started systemd-resolved.service. Feb 13 05:24:29.575545 systemd[1]: Reached target network.target. Feb 13 05:24:29.592506 systemd[1]: Reached target nss-lookup.target. Feb 13 05:24:29.600409 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 05:24:29.608494 systemd[1]: Reached target sysinit.target. Feb 13 05:24:29.616525 systemd[1]: Started motdgen.path. Feb 13 05:24:29.623639 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 05:24:29.633572 systemd[1]: Started logrotate.timer. Feb 13 05:24:29.640639 systemd[1]: Started mdadm.timer. Feb 13 05:24:29.647515 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 05:24:29.655596 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 05:24:29.655616 systemd[1]: Reached target paths.target. Feb 13 05:24:29.662581 systemd[1]: Reached target timers.target. Feb 13 05:24:29.669750 systemd[1]: Listening on dbus.socket. Feb 13 05:24:29.677234 systemd[1]: Starting docker.socket... Feb 13 05:24:29.686744 systemd[1]: Listening on sshd.socket. Feb 13 05:24:29.693669 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 05:24:29.694137 systemd[1]: Listening on docker.socket. Feb 13 05:24:29.700690 systemd[1]: Reached target sockets.target. Feb 13 05:24:29.716502 systemd[1]: Reached target basic.target. Feb 13 05:24:29.727413 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 05:24:29.735628 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 05:24:29.735643 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 05:24:29.736092 systemd[1]: Starting containerd.service... Feb 13 05:24:29.744052 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 05:24:29.752991 systemd[1]: Starting coreos-metadata.service... Feb 13 05:24:29.759983 systemd[1]: Starting dbus.service... Feb 13 05:24:29.766017 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 05:24:29.771443 jq[1429]: false Feb 13 05:24:29.773724 coreos-metadata[1422]: Feb 13 05:24:29.773 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 05:24:29.777777 coreos-metadata[1422]: Feb 13 05:24:29.777 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 05:24:29.777755 systemd[1]: Starting extend-filesystems.service... Feb 13 05:24:29.779356 dbus-daemon[1428]: [system] SELinux support is enabled Feb 13 05:24:29.781975 coreos-metadata[1425]: Feb 13 05:24:29.781 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 05:24:29.782651 coreos-metadata[1425]: Feb 13 05:24:29.782 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 05:24:29.785264 extend-filesystems[1431]: Found sda Feb 13 05:24:29.785264 extend-filesystems[1431]: Found sda1 Feb 13 05:24:29.849183 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 05:24:29.849285 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 05:24:29.849299 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 05:24:29.849309 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 05:24:29.808553 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda2 Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda3 Feb 13 05:24:29.849386 extend-filesystems[1431]: Found usr Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda4 Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda6 Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda7 Feb 13 05:24:29.849386 extend-filesystems[1431]: Found sda9 Feb 13 05:24:29.849386 extend-filesystems[1431]: Checking size of /dev/sda9 Feb 13 05:24:29.849386 extend-filesystems[1431]: Resized partition /dev/sda9 Feb 13 05:24:30.070469 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 05:24:30.070491 kernel: bond0: active interface up! Feb 13 05:24:30.070504 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 05:24:30.070519 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 05:24:30.070531 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 05:24:30.070542 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 05:24:29.809199 systemd[1]: Starting motdgen.service... Feb 13 05:24:30.070643 extend-filesystems[1439]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 05:24:29.850577 systemd-networkd[1312]: bond0: Link UP Feb 13 05:24:30.082255 dbus-daemon[1428]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 05:24:29.850790 systemd-networkd[1312]: enp1s0f1np1: Link UP Feb 13 05:24:29.850938 systemd-networkd[1312]: enp1s0f1np1: Gained carrier Feb 13 05:24:29.851890 systemd-networkd[1312]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 05:24:30.086828 update_engine[1458]: I0213 05:24:30.012180 1458 main.cc:92] Flatcar Update Engine starting Feb 13 05:24:30.086828 update_engine[1458]: I0213 05:24:30.015377 1458 update_check_scheduler.cc:74] Next update check in 4m24s Feb 13 05:24:29.869199 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 05:24:30.087026 jq[1459]: true Feb 13 05:24:29.917062 systemd[1]: Starting sshd-keygen.service... Feb 13 05:24:29.931755 systemd[1]: Starting systemd-logind.service... Feb 13 05:24:30.087226 jq[1462]: true Feb 13 05:24:29.953524 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 05:24:29.954480 systemd[1]: Starting tcsd.service... Feb 13 05:24:29.970062 systemd-logind[1456]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 05:24:29.970073 systemd-logind[1456]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 05:24:29.970081 systemd-logind[1456]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 05:24:29.970177 systemd-logind[1456]: New seat seat0. Feb 13 05:24:29.971082 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 05:24:29.971491 systemd[1]: Starting update-engine.service... Feb 13 05:24:29.984972 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 05:24:30.000737 systemd[1]: Started dbus.service. Feb 13 05:24:30.008500 systemd-networkd[1312]: enp1s0f0np0: Link UP Feb 13 05:24:30.008759 systemd-networkd[1312]: bond0: Gained carrier Feb 13 05:24:30.008891 systemd-networkd[1312]: enp1s0f0np0: Gained carrier Feb 13 05:24:30.008894 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.027650 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 05:24:30.027812 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 05:24:30.028070 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 05:24:30.028223 systemd[1]: Finished motdgen.service. Feb 13 05:24:30.031621 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.031667 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.031875 systemd-networkd[1312]: enp1s0f1np1: Link DOWN Feb 13 05:24:30.031877 systemd-networkd[1312]: enp1s0f1np1: Lost carrier Feb 13 05:24:30.059567 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.059610 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.059766 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.062625 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 05:24:30.062710 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 05:24:30.086288 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 05:24:30.086391 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 05:24:30.089236 systemd[1]: Started update-engine.service. Feb 13 05:24:30.090447 env[1463]: time="2024-02-13T05:24:30.090425692Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 05:24:30.098708 env[1463]: time="2024-02-13T05:24:30.098694807Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 05:24:30.100274 env[1463]: time="2024-02-13T05:24:30.100245635Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.100871 env[1463]: time="2024-02-13T05:24:30.100850555Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 05:24:30.100871 env[1463]: time="2024-02-13T05:24:30.100869793Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.101543 systemd[1]: Started systemd-logind.service. Feb 13 05:24:30.102589 env[1463]: time="2024-02-13T05:24:30.102576256Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102589 env[1463]: time="2024-02-13T05:24:30.102588886Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102640 env[1463]: time="2024-02-13T05:24:30.102597065Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 05:24:30.102640 env[1463]: time="2024-02-13T05:24:30.102602781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102686 env[1463]: time="2024-02-13T05:24:30.102647363Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102807 env[1463]: time="2024-02-13T05:24:30.102799163Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102880 env[1463]: time="2024-02-13T05:24:30.102870238Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 05:24:30.102905 env[1463]: time="2024-02-13T05:24:30.102880164Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 05:24:30.104707 env[1463]: time="2024-02-13T05:24:30.104692508Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 05:24:30.104743 env[1463]: time="2024-02-13T05:24:30.104707490Z" level=info msg="metadata content store policy set" policy=shared Feb 13 05:24:30.109212 bash[1489]: Updated "/home/core/.ssh/authorized_keys" Feb 13 05:24:30.109594 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 05:24:30.113619 env[1463]: time="2024-02-13T05:24:30.113601945Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 05:24:30.113649 env[1463]: time="2024-02-13T05:24:30.113622232Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 05:24:30.113649 env[1463]: time="2024-02-13T05:24:30.113630475Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113649759Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113658338Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113665543Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113672181Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113679089Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113688368Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113697 env[1463]: time="2024-02-13T05:24:30.113695670Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113808 env[1463]: time="2024-02-13T05:24:30.113702056Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113808 env[1463]: time="2024-02-13T05:24:30.113708678Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 05:24:30.113808 env[1463]: time="2024-02-13T05:24:30.113753781Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 05:24:30.113808 env[1463]: time="2024-02-13T05:24:30.113798465Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 05:24:30.113945 env[1463]: time="2024-02-13T05:24:30.113936805Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 05:24:30.113969 env[1463]: time="2024-02-13T05:24:30.113952350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.113969 env[1463]: time="2024-02-13T05:24:30.113959886Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 05:24:30.114466 env[1463]: time="2024-02-13T05:24:30.114447575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114495 env[1463]: time="2024-02-13T05:24:30.114475077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114495 env[1463]: time="2024-02-13T05:24:30.114487454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114536 env[1463]: time="2024-02-13T05:24:30.114497390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114536 env[1463]: time="2024-02-13T05:24:30.114513324Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114583 env[1463]: time="2024-02-13T05:24:30.114569980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114604 env[1463]: time="2024-02-13T05:24:30.114587294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114620 env[1463]: time="2024-02-13T05:24:30.114601047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114620 env[1463]: time="2024-02-13T05:24:30.114614541Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 05:24:30.114721 env[1463]: time="2024-02-13T05:24:30.114710567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114743 env[1463]: time="2024-02-13T05:24:30.114724992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114743 env[1463]: time="2024-02-13T05:24:30.114736940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114776 env[1463]: time="2024-02-13T05:24:30.114747559Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 05:24:30.114776 env[1463]: time="2024-02-13T05:24:30.114756882Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 05:24:30.114776 env[1463]: time="2024-02-13T05:24:30.114767417Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 05:24:30.114826 env[1463]: time="2024-02-13T05:24:30.114784243Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 05:24:30.114826 env[1463]: time="2024-02-13T05:24:30.114805905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 05:24:30.114941 env[1463]: time="2024-02-13T05:24:30.114916300Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.114949087Z" level=info msg="Connect containerd service" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.114968991Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115254485Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115341898Z" level=info msg="Start subscribing containerd event" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115379904Z" level=info msg="Start recovering state" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115385004Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115429716Z" level=info msg="Start event monitor" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115447685Z" level=info msg="Start snapshots syncer" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115449635Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115455604Z" level=info msg="Start cni network conf syncer for default" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115462337Z" level=info msg="Start streaming server" Feb 13 05:24:30.117545 env[1463]: time="2024-02-13T05:24:30.115474858Z" level=info msg="containerd successfully booted in 0.025395s" Feb 13 05:24:30.120501 systemd[1]: Started containerd.service. Feb 13 05:24:30.129069 systemd[1]: Started locksmithd.service. Feb 13 05:24:30.135525 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 05:24:30.135606 systemd[1]: Reached target system-config.target. Feb 13 05:24:30.143484 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 05:24:30.143549 systemd[1]: Reached target user-config.target. Feb 13 05:24:30.189304 locksmithd[1502]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 05:24:30.276411 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 05:24:30.276533 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 05:24:30.294431 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 05:24:30.312416 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 05:24:30.313846 systemd-networkd[1312]: enp1s0f1np1: Link UP Feb 13 05:24:30.313848 systemd-networkd[1312]: enp1s0f1np1: Gained carrier Feb 13 05:24:30.350410 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 05:24:30.363610 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.363689 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.363790 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:30.375461 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 05:24:30.401014 extend-filesystems[1439]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 05:24:30.401014 extend-filesystems[1439]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 05:24:30.401014 extend-filesystems[1439]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 05:24:30.437495 extend-filesystems[1431]: Resized filesystem in /dev/sda9 Feb 13 05:24:30.437495 extend-filesystems[1431]: Found sdb Feb 13 05:24:30.401497 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 05:24:30.401586 systemd[1]: Finished extend-filesystems.service. Feb 13 05:24:30.747105 sshd_keygen[1455]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 05:24:30.758931 systemd[1]: Finished sshd-keygen.service. Feb 13 05:24:30.766555 systemd[1]: Starting issuegen.service... Feb 13 05:24:30.773775 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 05:24:30.773861 systemd[1]: Finished issuegen.service. Feb 13 05:24:30.777779 coreos-metadata[1422]: Feb 13 05:24:30.777 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 05:24:30.781402 systemd[1]: Starting systemd-user-sessions.service... Feb 13 05:24:30.782746 coreos-metadata[1425]: Feb 13 05:24:30.782 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 05:24:30.789779 systemd[1]: Finished systemd-user-sessions.service. Feb 13 05:24:30.800276 systemd[1]: Started getty@tty1.service. Feb 13 05:24:30.808151 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 05:24:30.816648 systemd[1]: Reached target getty.target. Feb 13 05:24:31.442531 systemd-networkd[1312]: bond0: Gained IPv6LL Feb 13 05:24:31.442783 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:32.082750 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:32.082809 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:32.083640 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 05:24:32.094745 systemd[1]: Reached target network-online.target. Feb 13 05:24:33.678630 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 05:24:35.827855 login[1524]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 05:24:35.835499 systemd-logind[1456]: New session 1 of user core. Feb 13 05:24:35.836199 login[1523]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 05:24:35.836260 systemd[1]: Created slice user-500.slice. Feb 13 05:24:35.836890 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 05:24:35.838908 systemd-logind[1456]: New session 2 of user core. Feb 13 05:24:35.841961 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 05:24:35.842746 systemd[1]: Starting user@500.service... Feb 13 05:24:35.844497 (systemd)[1528]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:35.927691 systemd[1528]: Queued start job for default target default.target. Feb 13 05:24:35.929000 systemd[1528]: Reached target paths.target. Feb 13 05:24:35.929108 systemd[1528]: Reached target sockets.target. Feb 13 05:24:35.929188 systemd[1528]: Reached target timers.target. Feb 13 05:24:35.929266 systemd[1528]: Reached target basic.target. Feb 13 05:24:35.929445 systemd[1528]: Reached target default.target. Feb 13 05:24:35.929570 systemd[1528]: Startup finished in 82ms. Feb 13 05:24:35.929603 systemd[1]: Started user@500.service. Feb 13 05:24:35.932630 systemd[1]: Started session-1.scope. Feb 13 05:24:35.934539 systemd[1]: Started session-2.scope. Feb 13 05:24:36.026816 coreos-metadata[1422]: Feb 13 05:24:36.026 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 05:24:36.027562 coreos-metadata[1425]: Feb 13 05:24:36.026 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 13 05:24:37.880586 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 05:24:37.880739 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 05:24:37.907857 systemd[1]: Created slice system-sshd.slice. Feb 13 05:24:37.908709 systemd[1]: Started sshd@0-139.178.90.101:22-139.178.68.195:49060.service. Feb 13 05:24:37.958648 sshd[1549]: Accepted publickey for core from 139.178.68.195 port 49060 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:37.959636 sshd[1549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:37.963107 systemd-logind[1456]: New session 3 of user core. Feb 13 05:24:37.964308 systemd[1]: Started session-3.scope. Feb 13 05:24:38.018841 systemd[1]: Started sshd@1-139.178.90.101:22-139.178.68.195:49062.service. Feb 13 05:24:38.026800 coreos-metadata[1425]: Feb 13 05:24:38.026 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 13 05:24:38.027090 coreos-metadata[1422]: Feb 13 05:24:38.026 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 13 05:24:38.046173 coreos-metadata[1422]: Feb 13 05:24:38.046 INFO Fetch successful Feb 13 05:24:38.047081 coreos-metadata[1425]: Feb 13 05:24:38.047 INFO Fetch successful Feb 13 05:24:38.051885 sshd[1554]: Accepted publickey for core from 139.178.68.195 port 49062 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:38.052584 sshd[1554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:38.054733 systemd-logind[1456]: New session 4 of user core. Feb 13 05:24:38.055176 systemd[1]: Started session-4.scope. Feb 13 05:24:38.068155 unknown[1422]: wrote ssh authorized keys file for user: core Feb 13 05:24:38.068694 systemd[1]: Finished coreos-metadata.service. Feb 13 05:24:38.069814 systemd[1]: Starting etcd-member.service... Feb 13 05:24:38.070414 systemd[1]: Started packet-phone-home.service. Feb 13 05:24:38.080320 curl[1561]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 05:24:38.080930 curl[1561]: Dload Upload Total Spent Left Speed Feb 13 05:24:38.090191 update-ssh-keys[1559]: Updated "/home/core/.ssh/authorized_keys" Feb 13 05:24:38.091493 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 05:24:38.116496 sshd[1554]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:38.120972 systemd[1]: sshd@1-139.178.90.101:22-139.178.68.195:49062.service: Deactivated successfully. Feb 13 05:24:38.121690 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 05:24:38.122350 systemd-logind[1456]: Session 4 logged out. Waiting for processes to exit. Feb 13 05:24:38.124307 systemd[1]: Starting docker.service... Feb 13 05:24:38.125520 systemd[1]: Started sshd@2-139.178.90.101:22-139.178.68.195:49072.service. Feb 13 05:24:38.126313 systemd-logind[1456]: Removed session 4. Feb 13 05:24:38.151826 env[1578]: time="2024-02-13T05:24:38.151754335Z" level=info msg="Starting up" Feb 13 05:24:38.152669 env[1578]: time="2024-02-13T05:24:38.152652570Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 05:24:38.152669 env[1578]: time="2024-02-13T05:24:38.152665277Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 05:24:38.152756 env[1578]: time="2024-02-13T05:24:38.152680370Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 05:24:38.152756 env[1578]: time="2024-02-13T05:24:38.152688478Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 05:24:38.153671 env[1578]: time="2024-02-13T05:24:38.153655369Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 05:24:38.153671 env[1578]: time="2024-02-13T05:24:38.153667188Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 05:24:38.153760 env[1578]: time="2024-02-13T05:24:38.153678089Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 05:24:38.153760 env[1578]: time="2024-02-13T05:24:38.153685461Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 05:24:38.164861 sshd[1579]: Accepted publickey for core from 139.178.68.195 port 49072 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:38.165778 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:38.168815 systemd-logind[1456]: New session 5 of user core. Feb 13 05:24:38.169489 systemd[1]: Started session-5.scope. Feb 13 05:24:38.169932 env[1578]: time="2024-02-13T05:24:38.169886180Z" level=info msg="Loading containers: start." Feb 13 05:24:38.232984 sshd[1579]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:38.237124 systemd[1]: sshd@2-139.178.90.101:22-139.178.68.195:49072.service: Deactivated successfully. Feb 13 05:24:38.238381 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 05:24:38.239478 systemd-logind[1456]: Session 5 logged out. Waiting for processes to exit. Feb 13 05:24:38.241176 systemd-logind[1456]: Removed session 5. Feb 13 05:24:38.296392 curl[1561]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 05:24:38.298622 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 05:24:38.370499 kernel: Initializing XFRM netlink socket Feb 13 05:24:38.404802 env[1578]: time="2024-02-13T05:24:38.404729674Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 05:24:38.405551 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:38.405600 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:38.408944 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:38.409084 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:38.534234 systemd-networkd[1312]: docker0: Link UP Feb 13 05:24:38.534770 systemd-timesyncd[1416]: Network configuration changed, trying to establish connection. Feb 13 05:24:38.549106 env[1578]: time="2024-02-13T05:24:38.549057780Z" level=info msg="Loading containers: done." Feb 13 05:24:38.565651 env[1578]: time="2024-02-13T05:24:38.565588503Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 05:24:38.566069 env[1578]: time="2024-02-13T05:24:38.566021203Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 05:24:38.566305 env[1578]: time="2024-02-13T05:24:38.566263036Z" level=info msg="Daemon has completed initialization" Feb 13 05:24:38.567530 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1620345686-merged.mount: Deactivated successfully. Feb 13 05:24:38.587310 systemd[1]: Started docker.service. Feb 13 05:24:38.603956 env[1578]: time="2024-02-13T05:24:38.603804895Z" level=info msg="API listen on /run/docker.sock" Feb 13 05:24:38.606266 etcd-wrapper[1565]: Error response from daemon: No such container: etcd-member Feb 13 05:24:38.653053 etcd-wrapper[1707]: Error: No such container: etcd-member Feb 13 05:24:38.694141 etcd-wrapper[1729]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 05:24:40.057674 etcd-wrapper[1729]: v3.5.0: Pulling from coreos/etcd Feb 13 05:24:40.363717 etcd-wrapper[1729]: 1813d21adc01: Pulling fs layer Feb 13 05:24:40.363717 etcd-wrapper[1729]: 6e96907ab677: Pulling fs layer Feb 13 05:24:40.363717 etcd-wrapper[1729]: 444ed0ea8673: Pulling fs layer Feb 13 05:24:40.363717 etcd-wrapper[1729]: 0fd2df5633f0: Pulling fs layer Feb 13 05:24:40.364296 etcd-wrapper[1729]: 8cc22b9456bb: Pulling fs layer Feb 13 05:24:40.364296 etcd-wrapper[1729]: 7ac70aecd290: Pulling fs layer Feb 13 05:24:40.364296 etcd-wrapper[1729]: 4b376c64dfe4: Pulling fs layer Feb 13 05:24:40.364296 etcd-wrapper[1729]: 8cc22b9456bb: Waiting Feb 13 05:24:40.364296 etcd-wrapper[1729]: 4b376c64dfe4: Waiting Feb 13 05:24:40.364296 etcd-wrapper[1729]: 7ac70aecd290: Waiting Feb 13 05:24:40.364296 etcd-wrapper[1729]: 0fd2df5633f0: Waiting Feb 13 05:24:40.733488 etcd-wrapper[1729]: 444ed0ea8673: Verifying Checksum Feb 13 05:24:40.733488 etcd-wrapper[1729]: 444ed0ea8673: Download complete Feb 13 05:24:40.741589 etcd-wrapper[1729]: 6e96907ab677: Verifying Checksum Feb 13 05:24:40.741589 etcd-wrapper[1729]: 6e96907ab677: Download complete Feb 13 05:24:40.947717 etcd-wrapper[1729]: 1813d21adc01: Verifying Checksum Feb 13 05:24:40.947717 etcd-wrapper[1729]: 1813d21adc01: Download complete Feb 13 05:24:41.060981 etcd-wrapper[1729]: 0fd2df5633f0: Download complete Feb 13 05:24:41.243930 etcd-wrapper[1729]: 7ac70aecd290: Verifying Checksum Feb 13 05:24:41.243930 etcd-wrapper[1729]: 7ac70aecd290: Download complete Feb 13 05:24:41.368358 etcd-wrapper[1729]: 4b376c64dfe4: Verifying Checksum Feb 13 05:24:41.368358 etcd-wrapper[1729]: 4b376c64dfe4: Download complete Feb 13 05:24:41.430170 etcd-wrapper[1729]: 1813d21adc01: Pull complete Feb 13 05:24:41.626070 systemd[1]: var-lib-docker-overlay2-5e7caa19acc82fa7caa00843a79ab60c0ef77dee2e72b24baf3ab3839eeb581a-merged.mount: Deactivated successfully. Feb 13 05:24:41.882519 etcd-wrapper[1729]: 6e96907ab677: Pull complete Feb 13 05:24:42.037337 systemd[1]: var-lib-docker-overlay2-a34c4c9c33a96c9307b2a09446cab6ebb64dfbb151caa3de6a621c1f966e6da0-merged.mount: Deactivated successfully. Feb 13 05:24:42.082129 etcd-wrapper[1729]: 444ed0ea8673: Pull complete Feb 13 05:24:42.264475 etcd-wrapper[1729]: 0fd2df5633f0: Pull complete Feb 13 05:24:42.435592 systemd[1]: var-lib-docker-overlay2-f5f9ffebcc193fa6550da8ffc756f461d63f0558dda289a2d0902bcd323c78b0-merged.mount: Deactivated successfully. Feb 13 05:24:42.810507 etcd-wrapper[1729]: 8cc22b9456bb: Download complete Feb 13 05:24:42.835672 systemd[1]: var-lib-docker-overlay2-08a5fefb21962f4723c81176a1e8db396b22ae93067eb3785fca2f5c3e7cc5ab-merged.mount: Deactivated successfully. Feb 13 05:24:42.861929 etcd-wrapper[1729]: 8cc22b9456bb: Pull complete Feb 13 05:24:42.883106 systemd[1]: var-lib-docker-overlay2-de6e42c82fe7c4723f683e6cf754455a312cca929ea825fde026498cd68c0f40-merged.mount: Deactivated successfully. Feb 13 05:24:42.886033 etcd-wrapper[1729]: 7ac70aecd290: Pull complete Feb 13 05:24:42.909058 etcd-wrapper[1729]: 4b376c64dfe4: Pull complete Feb 13 05:24:42.911672 etcd-wrapper[1729]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 05:24:42.912511 etcd-wrapper[1729]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 05:24:42.952376 env[1463]: time="2024-02-13T05:24:42.952335497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 05:24:42.952376 env[1463]: time="2024-02-13T05:24:42.952361226Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 05:24:42.952376 env[1463]: time="2024-02-13T05:24:42.952370136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 05:24:42.952688 env[1463]: time="2024-02-13T05:24:42.952493099Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/b88113161bb04adaf915236e63ca958c766b8c6fb34ed4b7fb810bd07ceb8d58 pid=1911 runtime=io.containerd.runc.v2 Feb 13 05:24:42.959191 systemd[1]: Started docker-b88113161bb04adaf915236e63ca958c766b8c6fb34ed4b7fb810bd07ceb8d58.scope. Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"info","ts":1707801883.0002158,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"info","ts":1707801883.0002778,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"dcfc89299c5c4e99a2e4eeb22328d72b"} Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"warn","ts":1707801883.0003014,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"warn","ts":1707801883.0003088,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"warn","ts":1707801883.0003173,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 05:24:43.000399 etcd-wrapper[1729]: {"level":"warn","ts":1707801883.0003238,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 05:24:43.000666 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.000Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.35:2379"]} Feb 13 05:24:43.000666 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.000Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 05:24:43.000957 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.000Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 05:24:43.000990 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.000Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"dcfc89299c5c4e99a2e4eeb22328d72b","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"dcfc89299c5c4e99a2e4eeb22328d72b=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 05:24:43.012240 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.012Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"10.996153ms"} Feb 13 05:24:43.013928 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 05:24:43.013928 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 05:24:43.013928 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 05:24:43.013928 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 05:24:43.013928 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 05:24:43.014148 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.013Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 05:24:43.014664 etcd-wrapper[1729]: {"level":"warn","ts":"2024-02-13T05:24:43.014Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 05:24:43.015144 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.015Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 05:24:43.015424 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.015Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 05:24:43.015709 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.015Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 05:24:43.015905 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.015Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 05:24:43.016654 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.016Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 05:24:43.016654 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.016Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 05:24:43.018017 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.017Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 05:24:43.018017 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.017Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.35:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 05:24:43.018017 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.017Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 05:24:43.314768 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.314Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.315Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.315Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.315Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.315Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.315Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:dcfc89299c5c4e99a2e4eeb22328d72b ClientURLs:[http://10.67.80.35:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.316Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 05:24:43.316569 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.316Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 05:24:43.316588 systemd[1]: Started etcd-member.service. Feb 13 05:24:43.317443 systemd[1]: Reached target multi-user.target. Feb 13 05:24:43.317775 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:24:43.317Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 05:24:43.321313 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 05:24:43.325597 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 05:24:43.325678 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 05:24:43.325821 systemd[1]: Startup finished in 1.903s (kernel) + 16.429s (initrd) + 20.063s (userspace) = 38.396s. Feb 13 05:24:48.242064 systemd[1]: Started sshd@3-139.178.90.101:22-139.178.68.195:49264.service. Feb 13 05:24:48.275636 sshd[1964]: Accepted publickey for core from 139.178.68.195 port 49264 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.276547 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.279705 systemd-logind[1456]: New session 6 of user core. Feb 13 05:24:48.280269 systemd[1]: Started session-6.scope. Feb 13 05:24:48.334727 sshd[1964]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.336532 systemd[1]: sshd@3-139.178.90.101:22-139.178.68.195:49264.service: Deactivated successfully. Feb 13 05:24:48.336888 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 05:24:48.337227 systemd-logind[1456]: Session 6 logged out. Waiting for processes to exit. Feb 13 05:24:48.337851 systemd[1]: Started sshd@4-139.178.90.101:22-139.178.68.195:49274.service. Feb 13 05:24:48.338300 systemd-logind[1456]: Removed session 6. Feb 13 05:24:48.371295 sshd[1970]: Accepted publickey for core from 139.178.68.195 port 49274 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.372201 sshd[1970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.375227 systemd-logind[1456]: New session 7 of user core. Feb 13 05:24:48.375839 systemd[1]: Started session-7.scope. Feb 13 05:24:48.428367 sshd[1970]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.429930 systemd[1]: sshd@4-139.178.90.101:22-139.178.68.195:49274.service: Deactivated successfully. Feb 13 05:24:48.430224 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 05:24:48.430577 systemd-logind[1456]: Session 7 logged out. Waiting for processes to exit. Feb 13 05:24:48.431038 systemd[1]: Started sshd@5-139.178.90.101:22-139.178.68.195:49280.service. Feb 13 05:24:48.431347 systemd-logind[1456]: Removed session 7. Feb 13 05:24:48.464899 sshd[1976]: Accepted publickey for core from 139.178.68.195 port 49280 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.465830 sshd[1976]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.469103 systemd-logind[1456]: New session 8 of user core. Feb 13 05:24:48.469750 systemd[1]: Started session-8.scope. Feb 13 05:24:48.523684 sshd[1976]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.525230 systemd[1]: sshd@5-139.178.90.101:22-139.178.68.195:49280.service: Deactivated successfully. Feb 13 05:24:48.525594 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 05:24:48.525966 systemd-logind[1456]: Session 8 logged out. Waiting for processes to exit. Feb 13 05:24:48.526403 systemd[1]: Started sshd@6-139.178.90.101:22-139.178.68.195:49284.service. Feb 13 05:24:48.526872 systemd-logind[1456]: Removed session 8. Feb 13 05:24:48.560202 sshd[1983]: Accepted publickey for core from 139.178.68.195 port 49284 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.561169 sshd[1983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.564087 systemd-logind[1456]: New session 9 of user core. Feb 13 05:24:48.564781 systemd[1]: Started session-9.scope. Feb 13 05:24:48.658825 sudo[1986]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 05:24:48.659469 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 05:24:48.678841 dbus-daemon[1428]: \xd0M\xf0\u00194V: received setenforce notice (enforcing=-948806720) Feb 13 05:24:48.683783 sudo[1986]: pam_unix(sudo:session): session closed for user root Feb 13 05:24:48.688964 sshd[1983]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.696045 systemd[1]: sshd@6-139.178.90.101:22-139.178.68.195:49284.service: Deactivated successfully. Feb 13 05:24:48.696865 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 05:24:48.697247 systemd-logind[1456]: Session 9 logged out. Waiting for processes to exit. Feb 13 05:24:48.697791 systemd[1]: Started sshd@7-139.178.90.101:22-139.178.68.195:49292.service. Feb 13 05:24:48.698220 systemd-logind[1456]: Removed session 9. Feb 13 05:24:48.731208 sshd[1990]: Accepted publickey for core from 139.178.68.195 port 49292 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.732029 sshd[1990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.734840 systemd-logind[1456]: New session 10 of user core. Feb 13 05:24:48.735359 systemd[1]: Started session-10.scope. Feb 13 05:24:48.791687 sudo[1994]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 05:24:48.791797 sudo[1994]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 05:24:48.793585 sudo[1994]: pam_unix(sudo:session): session closed for user root Feb 13 05:24:48.795922 sudo[1993]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 05:24:48.796031 sudo[1993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 05:24:48.801385 systemd[1]: Stopping audit-rules.service... Feb 13 05:24:48.800000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 05:24:48.802238 auditctl[1997]: No rules Feb 13 05:24:48.802618 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 05:24:48.802793 systemd[1]: Stopped audit-rules.service. Feb 13 05:24:48.804401 systemd[1]: Starting audit-rules.service... Feb 13 05:24:48.807638 kernel: kauditd_printk_skb: 375 callbacks suppressed Feb 13 05:24:48.807680 kernel: audit: type=1305 audit(1707801888.800:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 05:24:48.815291 augenrules[2014]: No rules Feb 13 05:24:48.815847 systemd[1]: Finished audit-rules.service. Feb 13 05:24:48.816468 sudo[1993]: pam_unix(sudo:session): session closed for user root Feb 13 05:24:48.817449 sshd[1990]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.819753 systemd[1]: Started sshd@8-139.178.90.101:22-139.178.68.195:49296.service. Feb 13 05:24:48.820117 systemd[1]: sshd@7-139.178.90.101:22-139.178.68.195:49292.service: Deactivated successfully. Feb 13 05:24:48.820533 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 05:24:48.820965 systemd-logind[1456]: Session 10 logged out. Waiting for processes to exit. Feb 13 05:24:48.821616 systemd-logind[1456]: Removed session 10. Feb 13 05:24:48.800000 audit[1997]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7c543ab0 a2=420 a3=0 items=0 ppid=1 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:48.854168 kernel: audit: type=1300 audit(1707801888.800:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7c543ab0 a2=420 a3=0 items=0 ppid=1 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:48.854193 kernel: audit: type=1327 audit(1707801888.800:158): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 05:24:48.800000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 05:24:48.863736 kernel: audit: type=1131 audit(1707801888.801:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.886127 kernel: audit: type=1130 audit(1707801888.814:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.908573 kernel: audit: type=1106 audit(1707801888.815:161): pid=1993 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.815000 audit[1993]: USER_END pid=1993 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.913694 sshd[2019]: Accepted publickey for core from 139.178.68.195 port 49296 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:48.915023 sshd[2019]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:48.917308 systemd-logind[1456]: New session 11 of user core. Feb 13 05:24:48.917761 systemd[1]: Started session-11.scope. Feb 13 05:24:48.934638 kernel: audit: type=1104 audit(1707801888.815:162): pid=1993 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.815000 audit[1993]: CRED_DISP pid=1993 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.958267 kernel: audit: type=1106 audit(1707801888.816:163): pid=1990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.816000 audit[1990]: USER_END pid=1990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.964269 sshd[2019]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:48.966498 systemd[1]: sshd@8-139.178.90.101:22-139.178.68.195:49296.service: Deactivated successfully. Feb 13 05:24:48.967054 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 05:24:48.967563 systemd-logind[1456]: Session 11 logged out. Waiting for processes to exit. Feb 13 05:24:48.968549 systemd[1]: Started sshd@9-139.178.90.101:22-139.178.68.195:49306.service. Feb 13 05:24:48.969223 systemd-logind[1456]: Removed session 11. Feb 13 05:24:48.990581 kernel: audit: type=1104 audit(1707801888.816:164): pid=1990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.816000 audit[1990]: CRED_DISP pid=1990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.016652 kernel: audit: type=1130 audit(1707801888.818:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-139.178.68.195:49296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-139.178.68.195:49296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-139.178.68.195:49292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.912000 audit[2019]: USER_ACCT pid=2019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.913000 audit[2019]: CRED_ACQ pid=2019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.913000 audit[2019]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcae3ac3b0 a2=3 a3=0 items=0 ppid=1 pid=2019 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:48.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:24:48.918000 audit[2019]: USER_START pid=2019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.918000 audit[2022]: CRED_ACQ pid=2022 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.963000 audit[2019]: USER_END pid=2019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.963000 audit[2019]: CRED_DISP pid=2019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:48.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-139.178.68.195:49296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:48.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-139.178.68.195:49306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:49.042000 audit[2028]: USER_ACCT pid=2028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.044360 sshd[2028]: Accepted publickey for core from 139.178.68.195 port 49306 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:24:49.043000 audit[2028]: CRED_ACQ pid=2028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.043000 audit[2028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff81584fd0 a2=3 a3=0 items=0 ppid=1 pid=2028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:24:49.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:24:49.044982 sshd[2028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:24:49.047323 systemd-logind[1456]: New session 12 of user core. Feb 13 05:24:49.047778 systemd[1]: Started session-12.scope. Feb 13 05:24:49.048000 audit[2028]: USER_START pid=2028 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.048000 audit[2030]: CRED_ACQ pid=2030 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.392132 sshd[2028]: pam_unix(sshd:session): session closed for user core Feb 13 05:24:49.393000 audit[2028]: USER_END pid=2028 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.393000 audit[2028]: CRED_DISP pid=2028 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:24:49.398010 systemd[1]: sshd@9-139.178.90.101:22-139.178.68.195:49306.service: Deactivated successfully. Feb 13 05:24:49.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-139.178.68.195:49306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:24:49.399728 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 05:24:49.401440 systemd-logind[1456]: Session 12 logged out. Waiting for processes to exit. Feb 13 05:24:49.403891 systemd-logind[1456]: Removed session 12. Feb 13 05:24:50.626232 systemd[1]: Started sshd@10-139.178.90.101:22-118.195.184.139:46232.service. Feb 13 05:24:50.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-118.195.184.139:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:08.515391 systemd-resolved[1415]: Clock change detected. Flushing caches. Feb 13 05:25:08.515747 systemd-timesyncd[1416]: Contacted time server [2603:c020:0:8369::feeb:dab]:123 (2.flatcar.pool.ntp.org). Feb 13 05:25:08.515916 systemd-timesyncd[1416]: Initial clock synchronization to Tue 2024-02-13 05:25:08.515214 UTC. Feb 13 05:25:14.454156 update_engine[1458]: I0213 05:25:14.454041 1458 update_attempter.cc:509] Updating boot flags... Feb 13 05:25:19.764802 systemd[1]: Started sshd@11-139.178.90.101:22-134.175.129.189:52560.service. Feb 13 05:25:19.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-134.175.129.189:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:19.770437 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 13 05:25:19.770473 kernel: audit: type=1130 audit(1707801919.764:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-134.175.129.189:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:20.731385 sshd[2071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:25:20.730000 audit[2071]: USER_AUTH pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:25:20.808070 kernel: audit: type=1100 audit(1707801920.730:186): pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:25:22.789156 sshd[2071]: Failed password for root from 134.175.129.189 port 52560 ssh2 Feb 13 05:25:24.109478 sshd[2071]: Received disconnect from 134.175.129.189 port 52560:11: Bye Bye [preauth] Feb 13 05:25:24.109478 sshd[2071]: Disconnected from authenticating user root 134.175.129.189 port 52560 [preauth] Feb 13 05:25:24.111938 systemd[1]: sshd@11-139.178.90.101:22-134.175.129.189:52560.service: Deactivated successfully. Feb 13 05:25:24.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-134.175.129.189:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:24.191972 kernel: audit: type=1131 audit(1707801924.111:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-134.175.129.189:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:36.974532 systemd[1]: Started sshd@12-139.178.90.101:22-124.230.124.250:59864.service. Feb 13 05:25:36.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-124.230.124.250:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:37.057060 kernel: audit: type=1130 audit(1707801936.973:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-124.230.124.250:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:37.588747 systemd[1]: Started sshd@13-139.178.90.101:22-104.250.49.150:33223.service. Feb 13 05:25:37.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-104.250.49.150:33223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:37.673902 kernel: audit: type=1130 audit(1707801937.587:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-104.250.49.150:33223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:38.417109 sshd[2077]: Connection closed by 104.250.49.150 port 33223 [preauth] Feb 13 05:25:38.417850 systemd[1]: sshd@13-139.178.90.101:22-104.250.49.150:33223.service: Deactivated successfully. Feb 13 05:25:38.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-104.250.49.150:33223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:25:38.506977 kernel: audit: type=1131 audit(1707801938.417:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-104.250.49.150:33223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:02.353339 systemd[1]: Started sshd@14-139.178.90.101:22-134.175.129.189:35074.service. Feb 13 05:26:02.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-134.175.129.189:35074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:02.445073 kernel: audit: type=1130 audit(1707801962.352:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-134.175.129.189:35074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:03.319454 sshd[2081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:26:03.318000 audit[2081]: USER_AUTH pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:26:03.411072 kernel: audit: type=1100 audit(1707801963.318:192): pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:26:05.281160 sshd[2081]: Failed password for root from 134.175.129.189 port 35074 ssh2 Feb 13 05:26:06.693542 sshd[2081]: Received disconnect from 134.175.129.189 port 35074:11: Bye Bye [preauth] Feb 13 05:26:06.693542 sshd[2081]: Disconnected from authenticating user root 134.175.129.189 port 35074 [preauth] Feb 13 05:26:06.696168 systemd[1]: sshd@14-139.178.90.101:22-134.175.129.189:35074.service: Deactivated successfully. Feb 13 05:26:06.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-134.175.129.189:35074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:06.789056 kernel: audit: type=1131 audit(1707801966.695:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-134.175.129.189:35074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:11.087482 systemd[1]: Started sshd@15-139.178.90.101:22-132.255.50.81:9985.service. Feb 13 05:26:11.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-132.255.50.81:9985 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:11.180090 kernel: audit: type=1130 audit(1707801971.086:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-132.255.50.81:9985 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:12.094623 sshd[2085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:26:12.094000 audit[2085]: USER_AUTH pid=2085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:26:12.186061 kernel: audit: type=1100 audit(1707801972.094:195): pid=2085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:26:13.625779 sshd[2085]: Failed password for root from 132.255.50.81 port 9985 ssh2 Feb 13 05:26:13.878104 sshd[2085]: Received disconnect from 132.255.50.81 port 9985:11: Bye Bye [preauth] Feb 13 05:26:13.878104 sshd[2085]: Disconnected from authenticating user root 132.255.50.81 port 9985 [preauth] Feb 13 05:26:13.880439 systemd[1]: sshd@15-139.178.90.101:22-132.255.50.81:9985.service: Deactivated successfully. Feb 13 05:26:13.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-132.255.50.81:9985 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:13.973074 kernel: audit: type=1131 audit(1707801973.880:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.101:22-132.255.50.81:9985 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:50.129815 sshd[2051]: Timeout before authentication for 118.195.184.139 port 46232 Feb 13 05:26:50.131225 systemd[1]: sshd@10-139.178.90.101:22-118.195.184.139:46232.service: Deactivated successfully. Feb 13 05:26:50.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-118.195.184.139:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:26:50.225061 kernel: audit: type=1131 audit(1707802010.130:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-118.195.184.139:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:12.640200 systemd[1]: Started sshd@16-139.178.90.101:22-134.175.129.189:45860.service. Feb 13 05:27:12.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-134.175.129.189:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:12.732055 kernel: audit: type=1130 audit(1707802032.639:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-134.175.129.189:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:12.766535 systemd[1]: Started sshd@17-139.178.90.101:22-218.92.0.113:36567.service. Feb 13 05:27:12.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-218.92.0.113:36567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:12.857882 kernel: audit: type=1130 audit(1707802032.765:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-218.92.0.113:36567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:13.823606 sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:13.823000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:13.916063 kernel: audit: type=1100 audit(1707802033.823:200): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:14.461098 sshd[2094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:27:14.460000 audit[2094]: ANOM_LOGIN_FAILURES pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:14.461348 sshd[2094]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:27:14.460000 audit[2094]: USER_AUTH pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:27:14.617690 kernel: audit: type=2100 audit(1707802034.460:201): pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:14.617714 kernel: audit: type=1100 audit(1707802034.460:202): pid=2094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:27:15.395178 sshd[2096]: Failed password for root from 218.92.0.113 port 36567 ssh2 Feb 13 05:27:15.997000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:16.091063 kernel: audit: type=1100 audit(1707802035.997:203): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:16.504270 sshd[2094]: Failed password for root from 134.175.129.189 port 45860 ssh2 Feb 13 05:27:17.833857 sshd[2094]: Received disconnect from 134.175.129.189 port 45860:11: Bye Bye [preauth] Feb 13 05:27:17.833857 sshd[2094]: Disconnected from authenticating user root 134.175.129.189 port 45860 [preauth] Feb 13 05:27:17.836497 systemd[1]: sshd@16-139.178.90.101:22-134.175.129.189:45860.service: Deactivated successfully. Feb 13 05:27:17.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-134.175.129.189:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:17.929937 kernel: audit: type=1131 audit(1707802037.836:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.101:22-134.175.129.189:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:18.512820 sshd[2096]: Failed password for root from 218.92.0.113 port 36567 ssh2 Feb 13 05:27:19.369000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:19.463058 kernel: audit: type=1100 audit(1707802039.369:205): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:21.433505 sshd[2096]: Failed password for root from 218.92.0.113 port 36567 ssh2 Feb 13 05:27:22.742225 sshd[2096]: Received disconnect from 218.92.0.113 port 36567:11: [preauth] Feb 13 05:27:22.742225 sshd[2096]: Disconnected from authenticating user root 218.92.0.113 port 36567 [preauth] Feb 13 05:27:22.742757 sshd[2096]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:22.744706 systemd[1]: sshd@17-139.178.90.101:22-218.92.0.113:36567.service: Deactivated successfully. Feb 13 05:27:22.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-218.92.0.113:36567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:22.837938 kernel: audit: type=1131 audit(1707802042.744:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.101:22-218.92.0.113:36567 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:22.905817 systemd[1]: Started sshd@18-139.178.90.101:22-218.92.0.113:40546.service. Feb 13 05:27:22.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-218.92.0.113:40546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:22.997880 kernel: audit: type=1130 audit(1707802042.905:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-218.92.0.113:40546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:23.962030 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:23.961000 audit[2102]: USER_AUTH pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:24.055065 kernel: audit: type=1100 audit(1707802043.961:208): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:25.573717 sshd[2102]: Failed password for root from 218.92.0.113 port 40546 ssh2 Feb 13 05:27:27.333000 audit[2102]: USER_AUTH pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:27.426910 kernel: audit: type=1100 audit(1707802047.333:209): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:29.827288 sshd[2102]: Failed password for root from 218.92.0.113 port 40546 ssh2 Feb 13 05:27:30.706000 audit[2102]: USER_AUTH pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:30.798940 kernel: audit: type=1100 audit(1707802050.706:210): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:32.278803 sshd[2102]: Failed password for root from 218.92.0.113 port 40546 ssh2 Feb 13 05:27:32.474053 sshd[2102]: Received disconnect from 218.92.0.113 port 40546:11: [preauth] Feb 13 05:27:32.474053 sshd[2102]: Disconnected from authenticating user root 218.92.0.113 port 40546 [preauth] Feb 13 05:27:32.474594 sshd[2102]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:32.476546 systemd[1]: sshd@18-139.178.90.101:22-218.92.0.113:40546.service: Deactivated successfully. Feb 13 05:27:32.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-218.92.0.113:40546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:32.570072 kernel: audit: type=1131 audit(1707802052.476:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.101:22-218.92.0.113:40546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:32.633272 systemd[1]: Started sshd@19-139.178.90.101:22-218.92.0.113:48093.service. Feb 13 05:27:32.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-218.92.0.113:48093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:32.726071 kernel: audit: type=1130 audit(1707802052.632:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-218.92.0.113:48093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:33.477300 systemd[1]: Started sshd@20-139.178.90.101:22-104.250.49.150:42887.service. Feb 13 05:27:33.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-104.250.49.150:42887 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:33.570075 kernel: audit: type=1130 audit(1707802053.476:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-104.250.49.150:42887 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:33.676371 sshd[2106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:33.675000 audit[2106]: USER_AUTH pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:33.775075 kernel: audit: type=1100 audit(1707802053.675:214): pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:35.694490 sshd[2109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:27:35.693000 audit[2109]: USER_AUTH pid=2109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:27:35.788064 kernel: audit: type=1100 audit(1707802055.693:215): pid=2109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:27:35.995393 sshd[2106]: Failed password for root from 218.92.0.113 port 48093 ssh2 Feb 13 05:27:36.979527 sshd[2075]: Timeout before authentication for 124.230.124.250 port 59864 Feb 13 05:27:36.980974 systemd[1]: sshd@12-139.178.90.101:22-124.230.124.250:59864.service: Deactivated successfully. Feb 13 05:27:36.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-124.230.124.250:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:37.045000 audit[2106]: USER_AUTH pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:37.165076 kernel: audit: type=1131 audit(1707802056.980:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-124.230.124.250:59864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:37.165110 kernel: audit: type=1100 audit(1707802057.045:217): pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:37.286020 sshd[2109]: Failed password for root from 104.250.49.150 port 42887 ssh2 Feb 13 05:27:37.451321 sshd[2109]: Received disconnect from 104.250.49.150 port 42887:11: Bye Bye [preauth] Feb 13 05:27:37.451321 sshd[2109]: Disconnected from authenticating user root 104.250.49.150 port 42887 [preauth] Feb 13 05:27:37.454076 systemd[1]: sshd@20-139.178.90.101:22-104.250.49.150:42887.service: Deactivated successfully. Feb 13 05:27:37.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-104.250.49.150:42887 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:37.546928 kernel: audit: type=1131 audit(1707802057.453:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.101:22-104.250.49.150:42887 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:38.913154 sshd[2106]: Failed password for root from 218.92.0.113 port 48093 ssh2 Feb 13 05:27:40.416000 audit[2106]: USER_AUTH pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:40.508938 kernel: audit: type=1100 audit(1707802060.416:219): pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:27:42.696124 sshd[2106]: Failed password for root from 218.92.0.113 port 48093 ssh2 Feb 13 05:27:43.787549 sshd[2106]: Received disconnect from 218.92.0.113 port 48093:11: [preauth] Feb 13 05:27:43.787549 sshd[2106]: Disconnected from authenticating user root 218.92.0.113 port 48093 [preauth] Feb 13 05:27:43.788082 sshd[2106]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:27:43.790105 systemd[1]: sshd@19-139.178.90.101:22-218.92.0.113:48093.service: Deactivated successfully. Feb 13 05:27:43.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-218.92.0.113:48093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:27:43.882940 kernel: audit: type=1131 audit(1707802063.789:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.101:22-218.92.0.113:48093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:03.195565 systemd[1]: Started sshd@21-139.178.90.101:22-218.92.0.107:29179.service. Feb 13 05:28:03.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.107:29179 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:03.289077 kernel: audit: type=1130 audit(1707802083.194:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.107:29179 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:04.139183 sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:04.138000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:04.232062 kernel: audit: type=1100 audit(1707802084.138:222): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:06.713939 sshd[2115]: Failed password for root from 218.92.0.107 port 29179 ssh2 Feb 13 05:28:07.492000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:07.586070 kernel: audit: type=1100 audit(1707802087.492:223): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:08.400018 systemd[1]: Started sshd@22-139.178.90.101:22-124.230.124.250:50918.service. Feb 13 05:28:08.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-124.230.124.250:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:08.492069 kernel: audit: type=1130 audit(1707802088.399:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-124.230.124.250:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:09.145068 sshd[2115]: Failed password for root from 218.92.0.107 port 29179 ssh2 Feb 13 05:28:10.846000 audit[2115]: USER_AUTH pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:10.941064 kernel: audit: type=1100 audit(1707802090.846:225): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:12.910768 sshd[2115]: Failed password for root from 218.92.0.107 port 29179 ssh2 Feb 13 05:28:14.201694 sshd[2115]: Received disconnect from 218.92.0.107 port 29179:11: [preauth] Feb 13 05:28:14.201694 sshd[2115]: Disconnected from authenticating user root 218.92.0.107 port 29179 [preauth] Feb 13 05:28:14.202245 sshd[2115]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:14.204171 systemd[1]: sshd@21-139.178.90.101:22-218.92.0.107:29179.service: Deactivated successfully. Feb 13 05:28:14.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.107:29179 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:14.296882 kernel: audit: type=1131 audit(1707802094.203:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.101:22-218.92.0.107:29179 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:14.344952 systemd[1]: Started sshd@23-139.178.90.101:22-218.92.0.107:41744.service. Feb 13 05:28:14.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-218.92.0.107:41744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:14.437958 kernel: audit: type=1130 audit(1707802094.344:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-218.92.0.107:41744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:15.286695 sshd[2122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:15.286000 audit[2122]: USER_AUTH pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:15.379078 kernel: audit: type=1100 audit(1707802095.286:228): pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:17.369808 sshd[2122]: Failed password for root from 218.92.0.107 port 41744 ssh2 Feb 13 05:28:17.909845 systemd[1]: Started sshd@24-139.178.90.101:22-132.255.50.81:11699.service. Feb 13 05:28:17.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-132.255.50.81:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:18.003077 kernel: audit: type=1130 audit(1707802097.909:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-132.255.50.81:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:18.639000 audit[2122]: USER_AUTH pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:18.733076 kernel: audit: type=1100 audit(1707802098.639:230): pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:18.841792 systemd[1]: Started sshd@25-139.178.90.101:22-134.175.129.189:56636.service. Feb 13 05:28:18.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-134.175.129.189:56636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:18.935069 kernel: audit: type=1130 audit(1707802098.840:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-134.175.129.189:56636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:18.964509 sshd[2125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:28:18.963000 audit[2125]: USER_AUTH pid=2125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:28:19.056073 kernel: audit: type=1100 audit(1707802098.963:232): pid=2125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:28:20.467657 sshd[2122]: Failed password for root from 218.92.0.107 port 41744 ssh2 Feb 13 05:28:20.676732 sshd[2128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:28:20.676000 audit[2128]: USER_AUTH pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:28:20.769931 kernel: audit: type=1100 audit(1707802100.676:233): pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:28:20.791788 sshd[2125]: Failed password for root from 132.255.50.81 port 11699 ssh2 Feb 13 05:28:21.993000 audit[2122]: USER_AUTH pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:22.087073 kernel: audit: type=1100 audit(1707802101.993:234): pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:22.365525 sshd[2125]: Received disconnect from 132.255.50.81 port 11699:11: Bye Bye [preauth] Feb 13 05:28:22.365525 sshd[2125]: Disconnected from authenticating user root 132.255.50.81 port 11699 [preauth] Feb 13 05:28:22.368002 systemd[1]: sshd@24-139.178.90.101:22-132.255.50.81:11699.service: Deactivated successfully. Feb 13 05:28:22.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-132.255.50.81:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:22.462077 kernel: audit: type=1131 audit(1707802102.367:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.101:22-132.255.50.81:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:22.779847 sshd[2128]: Failed password for root from 134.175.129.189 port 56636 ssh2 Feb 13 05:28:24.056363 sshd[2128]: Received disconnect from 134.175.129.189 port 56636:11: Bye Bye [preauth] Feb 13 05:28:24.056363 sshd[2128]: Disconnected from authenticating user root 134.175.129.189 port 56636 [preauth] Feb 13 05:28:24.058816 systemd[1]: sshd@25-139.178.90.101:22-134.175.129.189:56636.service: Deactivated successfully. Feb 13 05:28:24.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-134.175.129.189:56636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:24.153056 kernel: audit: type=1131 audit(1707802104.058:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.101:22-134.175.129.189:56636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:24.232034 sshd[2122]: Failed password for root from 218.92.0.107 port 41744 ssh2 Feb 13 05:28:25.348019 sshd[2122]: Received disconnect from 218.92.0.107 port 41744:11: [preauth] Feb 13 05:28:25.348019 sshd[2122]: Disconnected from authenticating user root 218.92.0.107 port 41744 [preauth] Feb 13 05:28:25.348520 sshd[2122]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:25.350524 systemd[1]: sshd@23-139.178.90.101:22-218.92.0.107:41744.service: Deactivated successfully. Feb 13 05:28:25.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-218.92.0.107:41744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:25.444075 kernel: audit: type=1131 audit(1707802105.350:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.101:22-218.92.0.107:41744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:25.498332 systemd[1]: Started sshd@26-139.178.90.101:22-218.92.0.107:57251.service. Feb 13 05:28:25.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-218.92.0.107:57251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:25.591040 kernel: audit: type=1130 audit(1707802105.497:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-218.92.0.107:57251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:26.467128 sshd[2134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:26.466000 audit[2134]: USER_AUTH pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:26.560063 kernel: audit: type=1100 audit(1707802106.466:239): pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:28.394487 sshd[2134]: Failed password for root from 218.92.0.107 port 57251 ssh2 Feb 13 05:28:29.824000 audit[2134]: USER_AUTH pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:29.918009 kernel: audit: type=1100 audit(1707802109.824:240): pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:32.164452 sshd[2134]: Failed password for root from 218.92.0.107 port 57251 ssh2 Feb 13 05:28:33.183000 audit[2134]: USER_AUTH pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:33.277062 kernel: audit: type=1100 audit(1707802113.183:241): pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 13 05:28:35.407144 sshd[2134]: Failed password for root from 218.92.0.107 port 57251 ssh2 Feb 13 05:28:36.542463 sshd[2134]: Received disconnect from 218.92.0.107 port 57251:11: [preauth] Feb 13 05:28:36.542463 sshd[2134]: Disconnected from authenticating user root 218.92.0.107 port 57251 [preauth] Feb 13 05:28:36.543001 sshd[2134]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 13 05:28:36.544987 systemd[1]: sshd@26-139.178.90.101:22-218.92.0.107:57251.service: Deactivated successfully. Feb 13 05:28:36.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-218.92.0.107:57251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:36.639058 kernel: audit: type=1131 audit(1707802116.544:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.101:22-218.92.0.107:57251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:46.139300 systemd[1]: Started sshd@27-139.178.90.101:22-2.57.122.87:60174.service. Feb 13 05:28:46.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-2.57.122.87:60174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:46.232070 kernel: audit: type=1130 audit(1707802126.138:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-2.57.122.87:60174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:46.888805 sshd[2138]: Invalid user hlwang from 2.57.122.87 port 60174 Feb 13 05:28:47.078575 sshd[2138]: pam_faillock(sshd:auth): User unknown Feb 13 05:28:47.079657 sshd[2138]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:28:47.079744 sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:28:47.080660 sshd[2138]: pam_faillock(sshd:auth): User unknown Feb 13 05:28:47.079000 audit[2138]: USER_AUTH pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:28:47.173951 kernel: audit: type=1100 audit(1707802127.079:244): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:28:49.660767 systemd[1]: Started sshd@28-139.178.90.101:22-218.92.0.118:11188.service. Feb 13 05:28:49.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-218.92.0.118:11188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:49.754057 kernel: audit: type=1130 audit(1707802129.659:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-218.92.0.118:11188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:49.891260 sshd[2138]: Failed password for invalid user hlwang from 2.57.122.87 port 60174 ssh2 Feb 13 05:28:50.735766 sshd[2142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:28:50.735000 audit[2142]: USER_AUTH pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:50.828949 kernel: audit: type=1100 audit(1707802130.735:246): pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:52.623121 sshd[2142]: Failed password for root from 218.92.0.118 port 11188 ssh2 Feb 13 05:28:52.838712 sshd[2138]: Connection closed by invalid user hlwang 2.57.122.87 port 60174 [preauth] Feb 13 05:28:52.841156 systemd[1]: sshd@27-139.178.90.101:22-2.57.122.87:60174.service: Deactivated successfully. Feb 13 05:28:52.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-2.57.122.87:60174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:52.933935 kernel: audit: type=1131 audit(1707802132.840:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.101:22-2.57.122.87:60174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:28:53.528304 update_engine[1458]: I0213 05:28:53.528193 1458 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 05:28:53.528304 update_engine[1458]: I0213 05:28:53.528273 1458 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 05:28:53.529210 update_engine[1458]: I0213 05:28:53.529006 1458 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 05:28:53.530029 update_engine[1458]: I0213 05:28:53.529956 1458 omaha_request_params.cc:62] Current group set to lts Feb 13 05:28:53.530292 update_engine[1458]: I0213 05:28:53.530258 1458 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 05:28:53.530292 update_engine[1458]: I0213 05:28:53.530277 1458 update_attempter.cc:643] Scheduling an action processor start. Feb 13 05:28:53.530632 update_engine[1458]: I0213 05:28:53.530309 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 05:28:53.530632 update_engine[1458]: I0213 05:28:53.530376 1458 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 05:28:53.530632 update_engine[1458]: I0213 05:28:53.530514 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 05:28:53.530632 update_engine[1458]: I0213 05:28:53.530530 1458 omaha_request_action.cc:271] Request: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: Feb 13 05:28:53.530632 update_engine[1458]: I0213 05:28:53.530540 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:28:53.531784 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 05:28:53.533841 update_engine[1458]: I0213 05:28:53.533763 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:28:53.534061 update_engine[1458]: E0213 05:28:53.534006 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:28:53.534197 update_engine[1458]: I0213 05:28:53.534168 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 05:28:54.102000 audit[2142]: USER_AUTH pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:54.194932 kernel: audit: type=1100 audit(1707802134.102:248): pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:56.206164 sshd[2142]: Failed password for root from 218.92.0.118 port 11188 ssh2 Feb 13 05:28:57.480000 audit[2142]: USER_AUTH pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:57.574056 kernel: audit: type=1100 audit(1707802137.480:249): pid=2142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:28:59.664918 sshd[2142]: Failed password for root from 218.92.0.118 port 11188 ssh2 Feb 13 05:29:00.854242 sshd[2142]: Received disconnect from 218.92.0.118 port 11188:11: [preauth] Feb 13 05:29:00.854242 sshd[2142]: Disconnected from authenticating user root 218.92.0.118 port 11188 [preauth] Feb 13 05:29:00.854767 sshd[2142]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:29:00.856729 systemd[1]: sshd@28-139.178.90.101:22-218.92.0.118:11188.service: Deactivated successfully. Feb 13 05:29:00.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-218.92.0.118:11188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:00.950073 kernel: audit: type=1131 audit(1707802140.856:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.101:22-218.92.0.118:11188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:01.050809 systemd[1]: Started sshd@29-139.178.90.101:22-218.92.0.118:18571.service. Feb 13 05:29:01.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-218.92.0.118:18571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:01.144071 kernel: audit: type=1130 audit(1707802141.049:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-218.92.0.118:18571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:02.413617 sshd[2147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:29:02.413000 audit[2147]: USER_AUTH pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:02.506071 kernel: audit: type=1100 audit(1707802142.413:252): pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:03.438334 update_engine[1458]: I0213 05:29:03.438221 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:29:03.439183 update_engine[1458]: I0213 05:29:03.438699 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:29:03.439183 update_engine[1458]: E0213 05:29:03.438931 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:29:03.439183 update_engine[1458]: I0213 05:29:03.439110 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 05:29:04.281408 sshd[2147]: Failed password for root from 218.92.0.118 port 18571 ssh2 Feb 13 05:29:05.804000 audit[2147]: USER_AUTH pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:05.898066 kernel: audit: type=1100 audit(1707802145.804:253): pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:08.420794 sshd[2147]: Failed password for root from 218.92.0.118 port 18571 ssh2 Feb 13 05:29:09.197000 audit[2147]: USER_AUTH pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:09.290056 kernel: audit: type=1100 audit(1707802149.197:254): pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:11.361398 sshd[2147]: Failed password for root from 218.92.0.118 port 18571 ssh2 Feb 13 05:29:12.578916 sshd[2147]: Received disconnect from 218.92.0.118 port 18571:11: [preauth] Feb 13 05:29:12.578916 sshd[2147]: Disconnected from authenticating user root 218.92.0.118 port 18571 [preauth] Feb 13 05:29:12.579456 sshd[2147]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:29:12.581414 systemd[1]: sshd@29-139.178.90.101:22-218.92.0.118:18571.service: Deactivated successfully. Feb 13 05:29:12.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-218.92.0.118:18571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:12.675074 kernel: audit: type=1131 audit(1707802152.581:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.101:22-218.92.0.118:18571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:12.788026 systemd[1]: Started sshd@30-139.178.90.101:22-218.92.0.118:34202.service. Feb 13 05:29:12.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.118:34202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:12.881058 kernel: audit: type=1130 audit(1707802152.787:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.118:34202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:13.438601 update_engine[1458]: I0213 05:29:13.438485 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:29:13.439435 update_engine[1458]: I0213 05:29:13.439029 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:29:13.439435 update_engine[1458]: E0213 05:29:13.439234 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:29:13.439435 update_engine[1458]: I0213 05:29:13.439409 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 05:29:14.578371 sshd[2151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:29:14.577000 audit[2151]: USER_AUTH pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:14.671062 kernel: audit: type=1100 audit(1707802154.577:257): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:16.762003 sshd[2151]: Failed password for root from 218.92.0.118 port 34202 ssh2 Feb 13 05:29:17.987000 audit[2151]: USER_AUTH pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:18.081063 kernel: audit: type=1100 audit(1707802157.987:258): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:20.252012 sshd[2151]: Failed password for root from 218.92.0.118 port 34202 ssh2 Feb 13 05:29:21.397000 audit[2151]: USER_AUTH pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:21.491060 kernel: audit: type=1100 audit(1707802161.397:259): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:29:23.438795 update_engine[1458]: I0213 05:29:23.438683 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:29:23.439636 update_engine[1458]: I0213 05:29:23.439193 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:29:23.439636 update_engine[1458]: E0213 05:29:23.439404 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:29:23.439636 update_engine[1458]: I0213 05:29:23.439559 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 05:29:23.439636 update_engine[1458]: I0213 05:29:23.439575 1458 omaha_request_action.cc:621] Omaha request response: Feb 13 05:29:23.440040 update_engine[1458]: E0213 05:29:23.439719 1458 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439749 1458 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439757 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439765 1458 update_attempter.cc:306] Processing Done. Feb 13 05:29:23.440040 update_engine[1458]: E0213 05:29:23.439791 1458 update_attempter.cc:619] Update failed. Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439800 1458 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439810 1458 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439818 1458 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.439996 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 05:29:23.440040 update_engine[1458]: I0213 05:29:23.440047 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440058 1458 omaha_request_action.cc:271] Request: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440069 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440438 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:29:23.441068 update_engine[1458]: E0213 05:29:23.440672 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440847 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440867 1458 omaha_request_action.cc:621] Omaha request response: Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440896 1458 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440905 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440913 1458 update_attempter.cc:306] Processing Done. Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440920 1458 update_attempter.cc:310] Error event sent. Feb 13 05:29:23.441068 update_engine[1458]: I0213 05:29:23.440946 1458 update_check_scheduler.cc:74] Next update check in 42m32s Feb 13 05:29:23.442504 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 05:29:23.442504 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 05:29:23.542079 sshd[2151]: Failed password for root from 218.92.0.118 port 34202 ssh2 Feb 13 05:29:24.794387 sshd[2151]: Received disconnect from 218.92.0.118 port 34202:11: [preauth] Feb 13 05:29:24.794387 sshd[2151]: Disconnected from authenticating user root 218.92.0.118 port 34202 [preauth] Feb 13 05:29:24.794949 sshd[2151]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:29:24.796868 systemd[1]: sshd@30-139.178.90.101:22-218.92.0.118:34202.service: Deactivated successfully. Feb 13 05:29:24.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.118:34202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:24.889957 kernel: audit: type=1131 audit(1707802164.796:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.101:22-218.92.0.118:34202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:25.814330 systemd[1]: Started sshd@31-139.178.90.101:22-134.175.129.189:39186.service. Feb 13 05:29:25.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-134.175.129.189:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:25.907088 kernel: audit: type=1130 audit(1707802165.813:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-134.175.129.189:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:31.288963 systemd[1]: Started sshd@32-139.178.90.101:22-218.92.0.34:39343.service. Feb 13 05:29:31.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.34:39343 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:31.382071 kernel: audit: type=1130 audit(1707802171.287:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.34:39343 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:32.297627 sshd[2158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:29:32.296000 audit[2158]: USER_AUTH pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:32.390066 kernel: audit: type=1100 audit(1707802172.296:263): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:34.285291 sshd[2158]: Failed password for root from 218.92.0.34 port 39343 ssh2 Feb 13 05:29:35.661000 audit[2158]: USER_AUTH pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:35.755087 kernel: audit: type=1100 audit(1707802175.661:264): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:38.061954 sshd[2158]: Failed password for root from 218.92.0.34 port 39343 ssh2 Feb 13 05:29:39.027000 audit[2158]: USER_AUTH pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:39.119932 kernel: audit: type=1100 audit(1707802179.027:265): pid=2158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:39.572809 systemd[1]: Started sshd@33-139.178.90.101:22-104.250.49.150:52550.service. Feb 13 05:29:39.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-104.250.49.150:52550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:39.666079 kernel: audit: type=1130 audit(1707802179.572:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-104.250.49.150:52550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:40.644083 sshd[2158]: Failed password for root from 218.92.0.34 port 39343 ssh2 Feb 13 05:29:41.851727 sshd[2164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:29:41.851000 audit[2164]: USER_AUTH pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:29:41.945061 kernel: audit: type=1100 audit(1707802181.851:267): pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:29:42.392352 sshd[2158]: Received disconnect from 218.92.0.34 port 39343:11: [preauth] Feb 13 05:29:42.392352 sshd[2158]: Disconnected from authenticating user root 218.92.0.34 port 39343 [preauth] Feb 13 05:29:42.392909 sshd[2158]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:29:42.394848 systemd[1]: sshd@32-139.178.90.101:22-218.92.0.34:39343.service: Deactivated successfully. Feb 13 05:29:42.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.34:39343 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:42.488068 kernel: audit: type=1131 audit(1707802182.394:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.101:22-218.92.0.34:39343 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:42.543958 systemd[1]: Started sshd@34-139.178.90.101:22-218.92.0.34:58722.service. Feb 13 05:29:42.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-218.92.0.34:58722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:42.637074 kernel: audit: type=1130 audit(1707802182.543:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-218.92.0.34:58722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:43.545246 sshd[2168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:29:43.544000 audit[2168]: USER_AUTH pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:43.638038 kernel: audit: type=1100 audit(1707802183.544:270): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:44.075261 sshd[2164]: Failed password for root from 104.250.49.150 port 52550 ssh2 Feb 13 05:29:45.984344 sshd[2164]: Received disconnect from 104.250.49.150 port 52550:11: Bye Bye [preauth] Feb 13 05:29:45.984344 sshd[2164]: Disconnected from authenticating user root 104.250.49.150 port 52550 [preauth] Feb 13 05:29:45.986818 systemd[1]: sshd@33-139.178.90.101:22-104.250.49.150:52550.service: Deactivated successfully. Feb 13 05:29:45.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-104.250.49.150:52550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:46.044355 sshd[2168]: Failed password for root from 218.92.0.34 port 58722 ssh2 Feb 13 05:29:46.081040 kernel: audit: type=1131 audit(1707802185.986:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.101:22-104.250.49.150:52550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:46.908000 audit[2168]: USER_AUTH pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:47.000946 kernel: audit: type=1100 audit(1707802186.908:272): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:49.152305 sshd[2168]: Failed password for root from 218.92.0.34 port 58722 ssh2 Feb 13 05:29:50.271000 audit[2168]: USER_AUTH pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:50.365068 kernel: audit: type=1100 audit(1707802190.271:273): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:52.064383 sshd[2168]: Failed password for root from 218.92.0.34 port 58722 ssh2 Feb 13 05:29:53.636287 sshd[2168]: Received disconnect from 218.92.0.34 port 58722:11: [preauth] Feb 13 05:29:53.636287 sshd[2168]: Disconnected from authenticating user root 218.92.0.34 port 58722 [preauth] Feb 13 05:29:53.636801 sshd[2168]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:29:53.638790 systemd[1]: sshd@34-139.178.90.101:22-218.92.0.34:58722.service: Deactivated successfully. Feb 13 05:29:53.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-218.92.0.34:58722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:53.733061 kernel: audit: type=1131 audit(1707802193.638:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.101:22-218.92.0.34:58722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:53.802657 systemd[1]: Started sshd@35-139.178.90.101:22-218.92.0.34:25352.service. Feb 13 05:29:53.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-218.92.0.34:25352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:53.895946 kernel: audit: type=1130 audit(1707802193.802:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-218.92.0.34:25352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:29:54.827661 sshd[2173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:29:54.827000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:54.921065 kernel: audit: type=1100 audit(1707802194.827:276): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:56.835255 sshd[2173]: Failed password for root from 218.92.0.34 port 25352 ssh2 Feb 13 05:29:58.194000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:29:58.288061 kernel: audit: type=1100 audit(1707802198.194:277): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:30:00.419079 sshd[2173]: Failed password for root from 218.92.0.34 port 25352 ssh2 Feb 13 05:30:01.562000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:30:01.656058 kernel: audit: type=1100 audit(1707802201.562:278): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:30:03.199051 sshd[2173]: Failed password for root from 218.92.0.34 port 25352 ssh2 Feb 13 05:30:04.932167 sshd[2173]: Received disconnect from 218.92.0.34 port 25352:11: [preauth] Feb 13 05:30:04.932167 sshd[2173]: Disconnected from authenticating user root 218.92.0.34 port 25352 [preauth] Feb 13 05:30:04.932721 sshd[2173]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:30:04.934673 systemd[1]: sshd@35-139.178.90.101:22-218.92.0.34:25352.service: Deactivated successfully. Feb 13 05:30:04.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-218.92.0.34:25352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:05.029080 kernel: audit: type=1131 audit(1707802204.934:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.101:22-218.92.0.34:25352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:08.405130 sshd[2118]: Timeout before authentication for 124.230.124.250 port 50918 Feb 13 05:30:08.406554 systemd[1]: sshd@22-139.178.90.101:22-124.230.124.250:50918.service: Deactivated successfully. Feb 13 05:30:08.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-124.230.124.250:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:08.500074 kernel: audit: type=1131 audit(1707802208.405:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.101:22-124.230.124.250:50918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:09.751291 systemd[1]: Started sshd@36-139.178.90.101:22-124.230.124.250:47456.service. Feb 13 05:30:09.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-124.230.124.250:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:09.844931 kernel: audit: type=1130 audit(1707802209.750:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-124.230.124.250:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:17.462712 systemd[1]: Started sshd@37-139.178.90.101:22-132.255.50.81:50519.service. Feb 13 05:30:17.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-132.255.50.81:50519 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:17.555966 kernel: audit: type=1130 audit(1707802217.461:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-132.255.50.81:50519 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:18.533860 sshd[2182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:30:18.533000 audit[2182]: USER_AUTH pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:30:18.627062 kernel: audit: type=1100 audit(1707802218.533:283): pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:30:20.837471 sshd[2182]: Failed password for root from 132.255.50.81 port 50519 ssh2 Feb 13 05:30:21.928638 sshd[2182]: Received disconnect from 132.255.50.81 port 50519:11: Bye Bye [preauth] Feb 13 05:30:21.928638 sshd[2182]: Disconnected from authenticating user root 132.255.50.81 port 50519 [preauth] Feb 13 05:30:21.931091 systemd[1]: sshd@37-139.178.90.101:22-132.255.50.81:50519.service: Deactivated successfully. Feb 13 05:30:21.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-132.255.50.81:50519 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:22.025070 kernel: audit: type=1131 audit(1707802221.930:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.101:22-132.255.50.81:50519 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:31.115681 systemd[1]: Started sshd@38-139.178.90.101:22-134.175.129.189:49958.service. Feb 13 05:30:31.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-134.175.129.189:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:30:31.209072 kernel: audit: type=1130 audit(1707802231.114:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-134.175.129.189:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:25.819350 sshd[2155]: Timeout before authentication for 134.175.129.189 port 39186 Feb 13 05:31:25.820749 systemd[1]: sshd@31-139.178.90.101:22-134.175.129.189:39186.service: Deactivated successfully. Feb 13 05:31:25.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-134.175.129.189:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:25.913880 kernel: audit: type=1131 audit(1707802285.820:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.101:22-134.175.129.189:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:34.858645 systemd[1]: Started sshd@39-139.178.90.101:22-134.175.129.189:60738.service. Feb 13 05:31:34.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-134.175.129.189:60738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:34.952929 kernel: audit: type=1130 audit(1707802294.858:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-134.175.129.189:60738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:36.637208 sshd[2191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:31:36.636000 audit[2191]: USER_AUTH pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:31:36.675676 systemd[1]: Started sshd@40-139.178.90.101:22-45.79.168.172:32930.service. Feb 13 05:31:36.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-45.79.168.172:32930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:36.822101 kernel: audit: type=1100 audit(1707802296.636:288): pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:31:36.822151 kernel: audit: type=1130 audit(1707802296.674:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-45.79.168.172:32930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:37.357914 sshd[2195]: kex_exchange_identification: read: Connection reset by peer Feb 13 05:31:37.357914 sshd[2195]: Connection reset by 45.79.168.172 port 32930 Feb 13 05:31:37.359314 systemd[1]: sshd@40-139.178.90.101:22-45.79.168.172:32930.service: Deactivated successfully. Feb 13 05:31:37.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-45.79.168.172:32930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:37.453023 kernel: audit: type=1131 audit(1707802297.358:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.101:22-45.79.168.172:32930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:38.313767 sshd[2191]: Failed password for root from 134.175.129.189 port 60738 ssh2 Feb 13 05:31:40.006864 sshd[2191]: Received disconnect from 134.175.129.189 port 60738:11: Bye Bye [preauth] Feb 13 05:31:40.006864 sshd[2191]: Disconnected from authenticating user root 134.175.129.189 port 60738 [preauth] Feb 13 05:31:40.009335 systemd[1]: sshd@39-139.178.90.101:22-134.175.129.189:60738.service: Deactivated successfully. Feb 13 05:31:40.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-134.175.129.189:60738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:40.103088 kernel: audit: type=1131 audit(1707802300.008:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.101:22-134.175.129.189:60738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:46.143198 systemd[1]: Started sshd@41-139.178.90.101:22-104.250.49.150:33977.service. Feb 13 05:31:46.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-104.250.49.150:33977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:46.236954 kernel: audit: type=1130 audit(1707802306.142:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-104.250.49.150:33977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:47.889919 sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:31:47.889000 audit[2199]: USER_AUTH pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:31:47.983062 kernel: audit: type=1100 audit(1707802307.889:293): pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:31:49.742256 sshd[2199]: Failed password for root from 104.250.49.150 port 33977 ssh2 Feb 13 05:31:57.848819 sshd[2199]: Received disconnect from 104.250.49.150 port 33977:11: Bye Bye [preauth] Feb 13 05:31:57.848819 sshd[2199]: Disconnected from authenticating user root 104.250.49.150 port 33977 [preauth] Feb 13 05:31:57.851191 systemd[1]: sshd@41-139.178.90.101:22-104.250.49.150:33977.service: Deactivated successfully. Feb 13 05:31:57.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-104.250.49.150:33977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:31:57.945077 kernel: audit: type=1131 audit(1707802317.850:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.101:22-104.250.49.150:33977 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:09.756625 sshd[2180]: Timeout before authentication for 124.230.124.250 port 47456 Feb 13 05:32:09.758073 systemd[1]: sshd@36-139.178.90.101:22-124.230.124.250:47456.service: Deactivated successfully. Feb 13 05:32:09.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-124.230.124.250:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:09.852073 kernel: audit: type=1131 audit(1707802329.757:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.101:22-124.230.124.250:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:11.126642 systemd[1]: Started sshd@42-139.178.90.101:22-124.230.124.250:57932.service. Feb 13 05:32:11.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-124.230.124.250:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:11.219997 kernel: audit: type=1130 audit(1707802331.125:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-124.230.124.250:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:12.623096 sshd[2204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:32:12.622000 audit[2204]: USER_AUTH pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:32:12.707293 systemd[1]: Started sshd@43-139.178.90.101:22-132.255.50.81:35483.service. Feb 13 05:32:12.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-132.255.50.81:35483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:12.808743 kernel: audit: type=1100 audit(1707802332.622:297): pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:32:12.808777 kernel: audit: type=1130 audit(1707802332.706:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-132.255.50.81:35483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:13.908313 sshd[2204]: Failed password for root from 124.230.124.250 port 57932 ssh2 Feb 13 05:32:13.976172 sshd[2207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:32:13.975000 audit[2207]: ANOM_LOGIN_FAILURES pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:13.976411 sshd[2207]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:32:13.975000 audit[2207]: USER_AUTH pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:32:14.133712 kernel: audit: type=2100 audit(1707802333.975:299): pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:14.133740 kernel: audit: type=1100 audit(1707802333.975:300): pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:32:14.408070 sshd[2204]: Connection closed by authenticating user root 124.230.124.250 port 57932 [preauth] Feb 13 05:32:14.410574 systemd[1]: sshd@42-139.178.90.101:22-124.230.124.250:57932.service: Deactivated successfully. Feb 13 05:32:14.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-124.230.124.250:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:14.505067 kernel: audit: type=1131 audit(1707802334.410:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.101:22-124.230.124.250:57932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:15.554494 systemd[1]: Started sshd@44-139.178.90.101:22-124.230.124.250:62649.service. Feb 13 05:32:15.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-124.230.124.250:62649 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:15.648076 kernel: audit: type=1130 audit(1707802335.553:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-124.230.124.250:62649 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:15.733277 sshd[2207]: Failed password for root from 132.255.50.81 port 35483 ssh2 Feb 13 05:32:17.375087 sshd[2207]: Received disconnect from 132.255.50.81 port 35483:11: Bye Bye [preauth] Feb 13 05:32:17.375087 sshd[2207]: Disconnected from authenticating user root 132.255.50.81 port 35483 [preauth] Feb 13 05:32:17.377534 systemd[1]: sshd@43-139.178.90.101:22-132.255.50.81:35483.service: Deactivated successfully. Feb 13 05:32:17.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-132.255.50.81:35483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:17.471073 kernel: audit: type=1131 audit(1707802337.377:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.101:22-132.255.50.81:35483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:31.120861 sshd[2187]: Timeout before authentication for 134.175.129.189 port 49958 Feb 13 05:32:31.122300 systemd[1]: sshd@38-139.178.90.101:22-134.175.129.189:49958.service: Deactivated successfully. Feb 13 05:32:31.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-134.175.129.189:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:31.215938 kernel: audit: type=1131 audit(1707802351.121:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.101:22-134.175.129.189:49958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:40.438475 systemd[1]: Started sshd@45-139.178.90.101:22-134.175.129.189:43286.service. Feb 13 05:32:40.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-134.175.129.189:43286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:40.532086 kernel: audit: type=1130 audit(1707802360.437:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-134.175.129.189:43286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:42.232571 sshd[2216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.189 user=root Feb 13 05:32:42.231000 audit[2216]: ANOM_LOGIN_FAILURES pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:42.232813 sshd[2216]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:32:42.232000 audit[2216]: USER_AUTH pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:32:42.389866 kernel: audit: type=2100 audit(1707802362.231:306): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:42.389962 kernel: audit: type=1100 audit(1707802362.232:307): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.175.129.189 addr=134.175.129.189 terminal=ssh res=failed' Feb 13 05:32:43.969771 sshd[2216]: Failed password for root from 134.175.129.189 port 43286 ssh2 Feb 13 05:32:45.603571 sshd[2216]: Received disconnect from 134.175.129.189 port 43286:11: Bye Bye [preauth] Feb 13 05:32:45.603571 sshd[2216]: Disconnected from authenticating user root 134.175.129.189 port 43286 [preauth] Feb 13 05:32:45.605996 systemd[1]: sshd@45-139.178.90.101:22-134.175.129.189:43286.service: Deactivated successfully. Feb 13 05:32:45.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-134.175.129.189:43286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:32:45.698940 kernel: audit: type=1131 audit(1707802365.605:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.101:22-134.175.129.189:43286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:45.498895 systemd[1]: Started sshd@46-139.178.90.101:22-134.175.129.189:54052.service. Feb 13 05:33:45.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-134.175.129.189:54052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:45.590928 kernel: audit: type=1130 audit(1707802425.497:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-134.175.129.189:54052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:51.372531 systemd[1]: Started sshd@47-139.178.90.101:22-104.250.49.150:43634.service. Feb 13 05:33:51.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-104.250.49.150:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:51.465913 kernel: audit: type=1130 audit(1707802431.370:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-104.250.49.150:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:54.307411 sshd[2224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:33:54.306000 audit[2224]: USER_AUTH pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:33:54.401075 kernel: audit: type=1100 audit(1707802434.306:311): pid=2224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:33:55.929055 sshd[2224]: Failed password for root from 104.250.49.150 port 43634 ssh2 Feb 13 05:33:57.664036 sshd[2224]: Received disconnect from 104.250.49.150 port 43634:11: Bye Bye [preauth] Feb 13 05:33:57.664036 sshd[2224]: Disconnected from authenticating user root 104.250.49.150 port 43634 [preauth] Feb 13 05:33:57.666511 systemd[1]: sshd@47-139.178.90.101:22-104.250.49.150:43634.service: Deactivated successfully. Feb 13 05:33:57.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-104.250.49.150:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:33:57.760083 kernel: audit: type=1131 audit(1707802437.666:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.101:22-104.250.49.150:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:13.372598 systemd[1]: Started sshd@48-139.178.90.101:22-132.255.50.81:50235.service. Feb 13 05:34:13.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-132.255.50.81:50235 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:13.465941 kernel: audit: type=1130 audit(1707802453.371:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-132.255.50.81:50235 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:15.559846 sshd[2211]: Timeout before authentication for 124.230.124.250 port 62649 Feb 13 05:34:15.561280 systemd[1]: sshd@44-139.178.90.101:22-124.230.124.250:62649.service: Deactivated successfully. Feb 13 05:34:15.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-124.230.124.250:62649 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:15.656077 kernel: audit: type=1131 audit(1707802455.560:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.101:22-124.230.124.250:62649 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:17.802850 sshd[2229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:34:17.802000 audit[2229]: USER_AUTH pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:34:17.896047 kernel: audit: type=1100 audit(1707802457.802:315): pid=2229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:34:19.915089 sshd[2229]: Failed password for root from 132.255.50.81 port 50235 ssh2 Feb 13 05:34:21.197256 sshd[2229]: Received disconnect from 132.255.50.81 port 50235:11: Bye Bye [preauth] Feb 13 05:34:21.197256 sshd[2229]: Disconnected from authenticating user root 132.255.50.81 port 50235 [preauth] Feb 13 05:34:21.199786 systemd[1]: sshd@48-139.178.90.101:22-132.255.50.81:50235.service: Deactivated successfully. Feb 13 05:34:21.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-132.255.50.81:50235 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:34:21.292911 kernel: audit: type=1131 audit(1707802461.199:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.101:22-132.255.50.81:50235 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:35:45.504064 sshd[2221]: Timeout before authentication for 134.175.129.189 port 54052 Feb 13 05:35:45.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-134.175.129.189:54052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:35:45.505534 systemd[1]: sshd@46-139.178.90.101:22-134.175.129.189:54052.service: Deactivated successfully. Feb 13 05:35:45.600074 kernel: audit: type=1131 audit(1707802545.504:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.101:22-134.175.129.189:54052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:35:56.156479 systemd[1]: Started sshd@49-139.178.90.101:22-104.250.49.150:53310.service. Feb 13 05:35:56.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-104.250.49.150:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:35:56.250072 kernel: audit: type=1130 audit(1707802556.155:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-104.250.49.150:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:35:57.956751 sshd[2243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:35:57.956000 audit[2243]: USER_AUTH pid=2243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:35:58.048921 kernel: audit: type=1100 audit(1707802557.956:319): pid=2243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:36:00.466065 sshd[2243]: Failed password for root from 104.250.49.150 port 53310 ssh2 Feb 13 05:36:01.861582 sshd[2243]: Received disconnect from 104.250.49.150 port 53310:11: Bye Bye [preauth] Feb 13 05:36:01.861582 sshd[2243]: Disconnected from authenticating user root 104.250.49.150 port 53310 [preauth] Feb 13 05:36:01.864142 systemd[1]: sshd@49-139.178.90.101:22-104.250.49.150:53310.service: Deactivated successfully. Feb 13 05:36:01.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-104.250.49.150:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:36:01.957955 kernel: audit: type=1131 audit(1707802561.863:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.101:22-104.250.49.150:53310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:36:16.617699 systemd[1]: Started sshd@50-139.178.90.101:22-132.255.50.81:23169.service. Feb 13 05:36:16.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-132.255.50.81:23169 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:36:16.710960 kernel: audit: type=1130 audit(1707802576.616:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-132.255.50.81:23169 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:36:17.695671 sshd[2249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:36:17.695000 audit[2249]: USER_AUTH pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:36:17.786935 kernel: audit: type=1100 audit(1707802577.695:322): pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:36:19.949520 sshd[2249]: Failed password for root from 132.255.50.81 port 23169 ssh2 Feb 13 05:36:21.092132 sshd[2249]: Received disconnect from 132.255.50.81 port 23169:11: Bye Bye [preauth] Feb 13 05:36:21.092132 sshd[2249]: Disconnected from authenticating user root 132.255.50.81 port 23169 [preauth] Feb 13 05:36:21.094612 systemd[1]: sshd@50-139.178.90.101:22-132.255.50.81:23169.service: Deactivated successfully. Feb 13 05:36:21.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-132.255.50.81:23169 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:36:21.188047 kernel: audit: type=1131 audit(1707802581.094:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.101:22-132.255.50.81:23169 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:37:59.870440 systemd[1]: Started sshd@51-139.178.90.101:22-104.250.49.150:34737.service. Feb 13 05:37:59.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-104.250.49.150:34737 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:37:59.964073 kernel: audit: type=1130 audit(1707802679.869:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-104.250.49.150:34737 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:03.306001 sshd[2258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:38:03.305000 audit[2258]: USER_AUTH pid=2258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:38:03.400080 kernel: audit: type=1100 audit(1707802683.305:325): pid=2258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:38:04.776987 sshd[2258]: Failed password for root from 104.250.49.150 port 34737 ssh2 Feb 13 05:38:05.056532 sshd[2258]: Received disconnect from 104.250.49.150 port 34737:11: Bye Bye [preauth] Feb 13 05:38:05.056532 sshd[2258]: Disconnected from authenticating user root 104.250.49.150 port 34737 [preauth] Feb 13 05:38:05.058938 systemd[1]: sshd@51-139.178.90.101:22-104.250.49.150:34737.service: Deactivated successfully. Feb 13 05:38:05.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-104.250.49.150:34737 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:05.153965 kernel: audit: type=1131 audit(1707802685.058:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.101:22-104.250.49.150:34737 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:20.434095 systemd[1]: Started sshd@52-139.178.90.101:22-132.255.50.81:50576.service. Feb 13 05:38:20.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-132.255.50.81:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:20.528083 kernel: audit: type=1130 audit(1707802700.433:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-132.255.50.81:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:21.631441 sshd[2263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:38:21.630000 audit[2263]: USER_AUTH pid=2263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:38:21.725070 kernel: audit: type=1100 audit(1707802701.630:328): pid=2263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:38:23.573133 sshd[2263]: Failed password for root from 132.255.50.81 port 50576 ssh2 Feb 13 05:38:25.026168 sshd[2263]: Received disconnect from 132.255.50.81 port 50576:11: Bye Bye [preauth] Feb 13 05:38:25.026168 sshd[2263]: Disconnected from authenticating user root 132.255.50.81 port 50576 [preauth] Feb 13 05:38:25.028659 systemd[1]: sshd@52-139.178.90.101:22-132.255.50.81:50576.service: Deactivated successfully. Feb 13 05:38:25.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-132.255.50.81:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:25.123081 kernel: audit: type=1131 audit(1707802705.028:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.101:22-132.255.50.81:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:33.482099 systemd[1]: Started sshd@53-139.178.90.101:22-124.230.124.250:41572.service. Feb 13 05:38:33.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-124.230.124.250:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:33.576076 kernel: audit: type=1130 audit(1707802713.481:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-124.230.124.250:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:34.895192 sshd[2267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:38:34.894000 audit[2267]: USER_AUTH pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:38:34.988951 kernel: audit: type=1100 audit(1707802714.894:331): pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:38:36.621977 sshd[2267]: Failed password for root from 124.230.124.250 port 41572 ssh2 Feb 13 05:38:38.276031 sshd[2267]: Connection closed by authenticating user root 124.230.124.250 port 41572 [preauth] Feb 13 05:38:38.278533 systemd[1]: sshd@53-139.178.90.101:22-124.230.124.250:41572.service: Deactivated successfully. Feb 13 05:38:38.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-124.230.124.250:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:38.373079 kernel: audit: type=1131 audit(1707802718.278:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.101:22-124.230.124.250:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:38.448504 systemd[1]: Started sshd@54-139.178.90.101:22-124.230.124.250:38282.service. Feb 13 05:38:38.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-124.230.124.250:38282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:38.541946 kernel: audit: type=1130 audit(1707802718.448:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-124.230.124.250:38282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:39.862833 sshd[2272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:38:39.862000 audit[2272]: USER_AUTH pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:38:39.956936 kernel: audit: type=1100 audit(1707802719.862:334): pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:38:41.945633 sshd[2272]: Failed password for root from 124.230.124.250 port 38282 ssh2 Feb 13 05:38:43.242162 sshd[2272]: Connection closed by authenticating user root 124.230.124.250 port 38282 [preauth] Feb 13 05:38:43.244588 systemd[1]: sshd@54-139.178.90.101:22-124.230.124.250:38282.service: Deactivated successfully. Feb 13 05:38:43.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-124.230.124.250:38282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:43.339077 kernel: audit: type=1131 audit(1707802723.244:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.101:22-124.230.124.250:38282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:47.799450 systemd[1]: Started sshd@55-139.178.90.101:22-2.57.122.87:34480.service. Feb 13 05:38:47.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-2.57.122.87:34480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:47.893072 kernel: audit: type=1130 audit(1707802727.798:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-2.57.122.87:34480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:48.536779 sshd[2276]: Invalid user hlwang from 2.57.122.87 port 34480 Feb 13 05:38:48.721824 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 13 05:38:48.722896 sshd[2276]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:38:48.722987 sshd[2276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:38:48.724075 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 13 05:38:48.723000 audit[2276]: USER_AUTH pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:38:48.818064 kernel: audit: type=1100 audit(1707802728.723:337): pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:38:50.039480 sshd[2276]: Failed password for invalid user hlwang from 2.57.122.87 port 34480 ssh2 Feb 13 05:38:50.296324 sshd[2276]: Connection closed by invalid user hlwang 2.57.122.87 port 34480 [preauth] Feb 13 05:38:50.298690 systemd[1]: sshd@55-139.178.90.101:22-2.57.122.87:34480.service: Deactivated successfully. Feb 13 05:38:50.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-2.57.122.87:34480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:38:50.392956 kernel: audit: type=1131 audit(1707802730.298:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.101:22-2.57.122.87:34480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:39:13.776781 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 05:39:13.788622 systemd-tmpfiles[2282]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 05:39:13.788850 systemd-tmpfiles[2282]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 05:39:13.789548 systemd-tmpfiles[2282]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 05:39:13.799986 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 05:39:13.800111 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 05:39:13.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:39:13.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:39:13.890265 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 05:39:13.978335 kernel: audit: type=1130 audit(1707802753.799:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:39:13.978371 kernel: audit: type=1131 audit(1707802753.799:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:02.054825 systemd[1]: Started sshd@56-139.178.90.101:22-104.250.49.150:44401.service. Feb 13 05:40:02.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-104.250.49.150:44401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:02.149068 kernel: audit: type=1130 audit(1707802802.054:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-104.250.49.150:44401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:04.765247 sshd[2289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:40:04.764000 audit[2289]: USER_AUTH pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:40:04.857922 kernel: audit: type=1100 audit(1707802804.764:342): pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:40:06.848475 sshd[2289]: Failed password for root from 104.250.49.150 port 44401 ssh2 Feb 13 05:40:09.586491 sshd[2289]: Received disconnect from 104.250.49.150 port 44401:11: Bye Bye [preauth] Feb 13 05:40:09.586491 sshd[2289]: Disconnected from authenticating user root 104.250.49.150 port 44401 [preauth] Feb 13 05:40:09.589010 systemd[1]: sshd@56-139.178.90.101:22-104.250.49.150:44401.service: Deactivated successfully. Feb 13 05:40:09.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-104.250.49.150:44401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:09.682056 kernel: audit: type=1131 audit(1707802809.588:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.101:22-104.250.49.150:44401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:16.350795 systemd[1]: Started sshd@57-139.178.90.101:22-132.255.50.81:44211.service. Feb 13 05:40:16.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:44211 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:16.443919 kernel: audit: type=1130 audit(1707802816.349:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:44211 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:17.356432 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:40:17.355000 audit[2294]: ANOM_LOGIN_FAILURES pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:17.356670 sshd[2294]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:40:17.421929 kernel: audit: type=2100 audit(1707802817.355:345): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:17.421975 kernel: audit: type=1100 audit(1707802817.355:346): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:40:17.355000 audit[2294]: USER_AUTH pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:40:19.224009 sshd[2294]: Failed password for root from 132.255.50.81 port 44211 ssh2 Feb 13 05:40:20.740135 sshd[2294]: Received disconnect from 132.255.50.81 port 44211:11: Bye Bye [preauth] Feb 13 05:40:20.740135 sshd[2294]: Disconnected from authenticating user root 132.255.50.81 port 44211 [preauth] Feb 13 05:40:20.742658 systemd[1]: sshd@57-139.178.90.101:22-132.255.50.81:44211.service: Deactivated successfully. Feb 13 05:40:20.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:44211 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:40:20.837091 kernel: audit: type=1131 audit(1707802820.742:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.101:22-132.255.50.81:44211 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:41:05.699318 systemd[1]: Started sshd@58-139.178.90.101:22-124.230.124.250:19848.service. Feb 13 05:41:05.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-124.230.124.250:19848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:41:05.793078 kernel: audit: type=1130 audit(1707802865.698:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-124.230.124.250:19848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:41:11.113530 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:41:11.113Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1105} Feb 13 05:41:11.137072 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:41:11.136Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1105,"took":"22.826544ms"} Feb 13 05:42:08.444717 systemd[1]: Started sshd@59-139.178.90.101:22-104.250.49.150:54072.service. Feb 13 05:42:08.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-104.250.49.150:54072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:08.537926 kernel: audit: type=1130 audit(1707802928.443:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-104.250.49.150:54072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:14.302323 sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:42:14.301000 audit[2304]: USER_AUTH pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:42:14.393881 kernel: audit: type=1100 audit(1707802934.301:350): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:42:16.565833 sshd[2304]: Failed password for root from 104.250.49.150 port 54072 ssh2 Feb 13 05:42:17.659432 sshd[2304]: Received disconnect from 104.250.49.150 port 54072:11: Bye Bye [preauth] Feb 13 05:42:17.659432 sshd[2304]: Disconnected from authenticating user root 104.250.49.150 port 54072 [preauth] Feb 13 05:42:17.661912 systemd[1]: sshd@59-139.178.90.101:22-104.250.49.150:54072.service: Deactivated successfully. Feb 13 05:42:17.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-104.250.49.150:54072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:17.756068 kernel: audit: type=1131 audit(1707802937.660:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.101:22-104.250.49.150:54072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:26.654909 systemd[1]: Started sshd@60-139.178.90.101:22-132.255.50.81:5832.service. Feb 13 05:42:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-132.255.50.81:5832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:26.747901 kernel: audit: type=1130 audit(1707802946.654:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-132.255.50.81:5832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:27.728590 sshd[2309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:42:27.728000 audit[2309]: USER_AUTH pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:42:27.821951 kernel: audit: type=1100 audit(1707802947.728:353): pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:42:29.776472 sshd[2309]: Failed password for root from 132.255.50.81 port 5832 ssh2 Feb 13 05:42:31.125187 sshd[2309]: Received disconnect from 132.255.50.81 port 5832:11: Bye Bye [preauth] Feb 13 05:42:31.125187 sshd[2309]: Disconnected from authenticating user root 132.255.50.81 port 5832 [preauth] Feb 13 05:42:31.127718 systemd[1]: sshd@60-139.178.90.101:22-132.255.50.81:5832.service: Deactivated successfully. Feb 13 05:42:31.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-132.255.50.81:5832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:42:31.222072 kernel: audit: type=1131 audit(1707802951.127:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.101:22-132.255.50.81:5832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:05.704659 sshd[2301]: Timeout before authentication for 124.230.124.250 port 19848 Feb 13 05:43:05.706239 systemd[1]: sshd@58-139.178.90.101:22-124.230.124.250:19848.service: Deactivated successfully. Feb 13 05:43:05.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-124.230.124.250:19848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:05.800074 kernel: audit: type=1131 audit(1707802985.705:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.101:22-124.230.124.250:19848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:15.284306 systemd[1]: Started sshd@61-139.178.90.101:22-85.209.11.254:47318.service. Feb 13 05:43:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-85.209.11.254:47318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:15.376932 kernel: audit: type=1130 audit(1707802995.283:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-85.209.11.254:47318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:16.557945 sshd[2315]: Invalid user teste from 85.209.11.254 port 47318 Feb 13 05:43:16.901544 sshd[2315]: pam_faillock(sshd:auth): User unknown Feb 13 05:43:16.902809 sshd[2315]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:43:16.902932 sshd[2315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 Feb 13 05:43:16.903833 sshd[2315]: pam_faillock(sshd:auth): User unknown Feb 13 05:43:16.903000 audit[2315]: USER_AUTH pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teste" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 05:43:16.998078 kernel: audit: type=1100 audit(1707802996.903:357): pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teste" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 05:43:19.011805 sshd[2315]: Failed password for invalid user teste from 85.209.11.254 port 47318 ssh2 Feb 13 05:43:21.010425 sshd[2315]: Connection closed by invalid user teste 85.209.11.254 port 47318 [preauth] Feb 13 05:43:21.013026 systemd[1]: sshd@61-139.178.90.101:22-85.209.11.254:47318.service: Deactivated successfully. Feb 13 05:43:21.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-85.209.11.254:47318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:21.106932 kernel: audit: type=1131 audit(1707803001.012:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.101:22-85.209.11.254:47318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:39.605460 systemd[1]: Started sshd@62-139.178.90.101:22-61.177.172.140:63373.service. Feb 13 05:43:39.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-61.177.172.140:63373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:39.699899 kernel: audit: type=1130 audit(1707803019.604:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-61.177.172.140:63373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:41.198495 sshd[2319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:43:41.197000 audit[2319]: USER_AUTH pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:41.296069 kernel: audit: type=1100 audit(1707803021.197:360): pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:43.069290 sshd[2319]: Failed password for root from 61.177.172.140 port 63373 ssh2 Feb 13 05:43:44.584000 audit[2319]: USER_AUTH pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:44.679070 kernel: audit: type=1100 audit(1707803024.584:361): pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:46.201724 sshd[2319]: Failed password for root from 61.177.172.140 port 63373 ssh2 Feb 13 05:43:47.971000 audit[2319]: ANOM_LOGIN_FAILURES pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:47.972128 sshd[2319]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:43:47.971000 audit[2319]: USER_AUTH pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:48.129783 kernel: audit: type=2100 audit(1707803027.971:362): pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:48.129813 kernel: audit: type=1100 audit(1707803027.971:363): pid=2319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:50.667700 sshd[2319]: Failed password for root from 61.177.172.140 port 63373 ssh2 Feb 13 05:43:51.356659 sshd[2319]: Received disconnect from 61.177.172.140 port 63373:11: [preauth] Feb 13 05:43:51.356659 sshd[2319]: Disconnected from authenticating user root 61.177.172.140 port 63373 [preauth] Feb 13 05:43:51.357234 sshd[2319]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:43:51.359304 systemd[1]: sshd@62-139.178.90.101:22-61.177.172.140:63373.service: Deactivated successfully. Feb 13 05:43:51.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-61.177.172.140:63373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:51.454013 kernel: audit: type=1131 audit(1707803031.357:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.101:22-61.177.172.140:63373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:51.500394 systemd[1]: Started sshd@63-139.178.90.101:22-61.177.172.140:30165.service. Feb 13 05:43:51.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-61.177.172.140:30165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:51.594075 kernel: audit: type=1130 audit(1707803031.498:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-61.177.172.140:30165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:43:52.543239 sshd[2323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:43:52.541000 audit[2323]: USER_AUTH pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:52.636927 kernel: audit: type=1100 audit(1707803032.541:366): pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:54.259909 sshd[2323]: Failed password for root from 61.177.172.140 port 30165 ssh2 Feb 13 05:43:55.918000 audit[2323]: USER_AUTH pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:56.012929 kernel: audit: type=1100 audit(1707803035.918:367): pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:57.381007 sshd[2323]: Failed password for root from 61.177.172.140 port 30165 ssh2 Feb 13 05:43:57.679000 audit[2323]: USER_AUTH pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:57.774939 kernel: audit: type=1100 audit(1707803037.679:368): pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:43:59.749742 sshd[2323]: Failed password for root from 61.177.172.140 port 30165 ssh2 Feb 13 05:44:01.048917 sshd[2323]: Received disconnect from 61.177.172.140 port 30165:11: [preauth] Feb 13 05:44:01.048917 sshd[2323]: Disconnected from authenticating user root 61.177.172.140 port 30165 [preauth] Feb 13 05:44:01.049443 sshd[2323]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:44:01.051508 systemd[1]: sshd@63-139.178.90.101:22-61.177.172.140:30165.service: Deactivated successfully. Feb 13 05:44:01.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-61.177.172.140:30165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:01.146075 kernel: audit: type=1131 audit(1707803041.051:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.101:22-61.177.172.140:30165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:01.210728 systemd[1]: Started sshd@64-139.178.90.101:22-61.177.172.140:37480.service. Feb 13 05:44:01.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:01.303938 kernel: audit: type=1130 audit(1707803041.208:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:02.941369 sshd[2328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:44:02.940000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:03.034909 kernel: audit: type=1100 audit(1707803042.940:371): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:04.697151 sshd[2328]: Failed password for root from 61.177.172.140 port 37480 ssh2 Feb 13 05:44:06.313000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:06.406922 kernel: audit: type=1100 audit(1707803046.313:372): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:08.616345 sshd[2328]: Failed password for root from 61.177.172.140 port 37480 ssh2 Feb 13 05:44:09.680000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:09.773925 kernel: audit: type=1100 audit(1707803049.680:373): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:44:11.729158 sshd[2328]: Failed password for root from 61.177.172.140 port 37480 ssh2 Feb 13 05:44:13.047487 sshd[2328]: Received disconnect from 61.177.172.140 port 37480:11: [preauth] Feb 13 05:44:13.047487 sshd[2328]: Disconnected from authenticating user root 61.177.172.140 port 37480 [preauth] Feb 13 05:44:13.048000 sshd[2328]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:44:13.050072 systemd[1]: sshd@64-139.178.90.101:22-61.177.172.140:37480.service: Deactivated successfully. Feb 13 05:44:13.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:13.144059 kernel: audit: type=1131 audit(1707803053.049:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.101:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:14.056787 systemd[1]: Started sshd@65-139.178.90.101:22-104.250.49.150:35498.service. Feb 13 05:44:14.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:35498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:14.151075 kernel: audit: type=1130 audit(1707803054.055:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:35498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:17.806040 sshd[2332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:44:17.805000 audit[2332]: USER_AUTH pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:44:17.899060 kernel: audit: type=1100 audit(1707803057.805:376): pid=2332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:44:19.954329 sshd[2332]: Failed password for root from 104.250.49.150 port 35498 ssh2 Feb 13 05:44:21.161913 sshd[2332]: Received disconnect from 104.250.49.150 port 35498:11: Bye Bye [preauth] Feb 13 05:44:21.161913 sshd[2332]: Disconnected from authenticating user root 104.250.49.150 port 35498 [preauth] Feb 13 05:44:21.164426 systemd[1]: sshd@65-139.178.90.101:22-104.250.49.150:35498.service: Deactivated successfully. Feb 13 05:44:21.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:35498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:21.258986 kernel: audit: type=1131 audit(1707803061.164:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.101:22-104.250.49.150:35498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:34.507476 systemd[1]: Started sshd@66-139.178.90.101:22-132.255.50.81:26814.service. Feb 13 05:44:34.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-132.255.50.81:26814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:34.601073 kernel: audit: type=1130 audit(1707803074.506:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-132.255.50.81:26814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:35.552591 sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:44:35.551000 audit[2337]: USER_AUTH pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:44:35.646061 kernel: audit: type=1100 audit(1707803075.551:379): pid=2337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:44:37.505029 sshd[2337]: Failed password for root from 132.255.50.81 port 26814 ssh2 Feb 13 05:44:38.936061 sshd[2337]: Received disconnect from 132.255.50.81 port 26814:11: Bye Bye [preauth] Feb 13 05:44:38.936061 sshd[2337]: Disconnected from authenticating user root 132.255.50.81 port 26814 [preauth] Feb 13 05:44:38.938589 systemd[1]: sshd@66-139.178.90.101:22-132.255.50.81:26814.service: Deactivated successfully. Feb 13 05:44:38.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-132.255.50.81:26814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:44:39.033073 kernel: audit: type=1131 audit(1707803078.938:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.101:22-132.255.50.81:26814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:16.293291 systemd[1]: Started sshd@67-139.178.90.101:22-124.230.124.250:40974.service. Feb 13 05:45:16.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-124.230.124.250:40974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:16.387042 kernel: audit: type=1130 audit(1707803116.292:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-124.230.124.250:40974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:17.691797 sshd[2344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:45:17.691000 audit[2344]: USER_AUTH pid=2344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:17.786074 kernel: audit: type=1100 audit(1707803117.691:382): pid=2344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:19.744148 sshd[2344]: Failed password for root from 124.230.124.250 port 40974 ssh2 Feb 13 05:45:21.085914 sshd[2344]: Connection closed by authenticating user root 124.230.124.250 port 40974 [preauth] Feb 13 05:45:21.088447 systemd[1]: sshd@67-139.178.90.101:22-124.230.124.250:40974.service: Deactivated successfully. Feb 13 05:45:21.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-124.230.124.250:40974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:21.183076 kernel: audit: type=1131 audit(1707803121.088:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.101:22-124.230.124.250:40974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:22.292049 systemd[1]: Started sshd@68-139.178.90.101:22-124.230.124.250:37658.service. Feb 13 05:45:22.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-124.230.124.250:37658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:22.386077 kernel: audit: type=1130 audit(1707803122.291:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-124.230.124.250:37658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:23.801304 sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:45:23.800000 audit[2350]: USER_AUTH pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:23.895069 kernel: audit: type=1100 audit(1707803123.800:385): pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:26.009988 sshd[2350]: Failed password for root from 124.230.124.250 port 37658 ssh2 Feb 13 05:45:27.194942 sshd[2350]: Connection closed by authenticating user root 124.230.124.250 port 37658 [preauth] Feb 13 05:45:27.197293 systemd[1]: sshd@68-139.178.90.101:22-124.230.124.250:37658.service: Deactivated successfully. Feb 13 05:45:27.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-124.230.124.250:37658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:27.290948 kernel: audit: type=1131 audit(1707803127.196:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.101:22-124.230.124.250:37658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:30.391086 systemd[1]: Started sshd@69-139.178.90.101:22-124.230.124.250:51398.service. Feb 13 05:45:30.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-124.230.124.250:51398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:30.482929 kernel: audit: type=1130 audit(1707803130.390:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-124.230.124.250:51398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:31.892842 sshd[2356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.124.250 user=root Feb 13 05:45:31.892000 audit[2356]: USER_AUTH pid=2356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:31.986062 kernel: audit: type=1100 audit(1707803131.892:388): pid=2356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.230.124.250 addr=124.230.124.250 terminal=ssh res=failed' Feb 13 05:45:33.534253 sshd[2356]: Failed password for root from 124.230.124.250 port 51398 ssh2 Feb 13 05:45:35.285417 sshd[2356]: Connection closed by authenticating user root 124.230.124.250 port 51398 [preauth] Feb 13 05:45:35.287915 systemd[1]: sshd@69-139.178.90.101:22-124.230.124.250:51398.service: Deactivated successfully. Feb 13 05:45:35.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-124.230.124.250:51398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:45:35.382041 kernel: audit: type=1131 audit(1707803135.287:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.101:22-124.230.124.250:51398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:01.914893 systemd[1]: Started sshd@70-139.178.90.101:22-218.92.0.113:59588.service. Feb 13 05:46:01.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.113:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:02.007937 kernel: audit: type=1130 audit(1707803161.914:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.113:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:02.968929 sshd[2362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:02.968000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:03.060966 kernel: audit: type=1100 audit(1707803162.968:391): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:04.866389 sshd[2362]: Failed password for root from 218.92.0.113 port 59588 ssh2 Feb 13 05:46:06.336000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:06.430967 kernel: audit: type=1100 audit(1707803166.336:392): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:08.450588 sshd[2362]: Failed password for root from 218.92.0.113 port 59588 ssh2 Feb 13 05:46:09.705000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:09.798963 kernel: audit: type=1100 audit(1707803169.705:393): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:11.116552 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:46:11.115Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1655} Feb 13 05:46:11.118899 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:46:11.118Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1655,"took":"2.206315ms"} Feb 13 05:46:11.563322 sshd[2362]: Failed password for root from 218.92.0.113 port 59588 ssh2 Feb 13 05:46:13.072037 sshd[2362]: Received disconnect from 218.92.0.113 port 59588:11: [preauth] Feb 13 05:46:13.072037 sshd[2362]: Disconnected from authenticating user root 218.92.0.113 port 59588 [preauth] Feb 13 05:46:13.072572 sshd[2362]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:13.074627 systemd[1]: sshd@70-139.178.90.101:22-218.92.0.113:59588.service: Deactivated successfully. Feb 13 05:46:13.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.113:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:13.171081 kernel: audit: type=1131 audit(1707803173.074:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.101:22-218.92.0.113:59588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:13.228410 systemd[1]: Started sshd@71-139.178.90.101:22-218.92.0.113:11206.service. Feb 13 05:46:13.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-218.92.0.113:11206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:13.319955 kernel: audit: type=1130 audit(1707803173.227:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-218.92.0.113:11206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:14.257029 sshd[2368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:14.256000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:14.348941 kernel: audit: type=1100 audit(1707803174.256:396): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:15.933689 systemd[1]: Started sshd@72-139.178.90.101:22-104.250.49.150:45168.service. Feb 13 05:46:15.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-104.250.49.150:45168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:16.027071 kernel: audit: type=1130 audit(1707803175.932:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-104.250.49.150:45168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:16.134105 sshd[2368]: Failed password for root from 218.92.0.113 port 11206 ssh2 Feb 13 05:46:17.624000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:17.717937 kernel: audit: type=1100 audit(1707803177.624:398): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:19.914711 sshd[2368]: Failed password for root from 218.92.0.113 port 11206 ssh2 Feb 13 05:46:20.781559 sshd[2371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:46:20.780000 audit[2371]: USER_AUTH pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:46:20.874063 kernel: audit: type=1100 audit(1707803180.780:399): pid=2371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:46:20.992000 audit[2368]: USER_AUTH pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:21.085072 kernel: audit: type=1100 audit(1707803180.992:400): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:22.814144 sshd[2371]: Failed password for root from 104.250.49.150 port 45168 ssh2 Feb 13 05:46:23.026245 sshd[2368]: Failed password for root from 218.92.0.113 port 11206 ssh2 Feb 13 05:46:24.138699 sshd[2371]: Received disconnect from 104.250.49.150 port 45168:11: Bye Bye [preauth] Feb 13 05:46:24.138699 sshd[2371]: Disconnected from authenticating user root 104.250.49.150 port 45168 [preauth] Feb 13 05:46:24.141012 systemd[1]: sshd@72-139.178.90.101:22-104.250.49.150:45168.service: Deactivated successfully. Feb 13 05:46:24.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-104.250.49.150:45168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:24.234947 kernel: audit: type=1131 audit(1707803184.140:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.101:22-104.250.49.150:45168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:24.359639 sshd[2368]: Received disconnect from 218.92.0.113 port 11206:11: [preauth] Feb 13 05:46:24.359639 sshd[2368]: Disconnected from authenticating user root 218.92.0.113 port 11206 [preauth] Feb 13 05:46:24.360183 sshd[2368]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:24.362197 systemd[1]: sshd@71-139.178.90.101:22-218.92.0.113:11206.service: Deactivated successfully. Feb 13 05:46:24.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-218.92.0.113:11206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:24.455069 kernel: audit: type=1131 audit(1707803184.361:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.101:22-218.92.0.113:11206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:24.537819 systemd[1]: Started sshd@73-139.178.90.101:22-218.92.0.113:23225.service. Feb 13 05:46:24.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-218.92.0.113:23225 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:24.630928 kernel: audit: type=1130 audit(1707803184.537:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-218.92.0.113:23225 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:25.615229 sshd[2377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:25.614000 audit[2377]: USER_AUTH pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:25.707978 kernel: audit: type=1100 audit(1707803185.614:404): pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:27.336793 sshd[2377]: Failed password for root from 218.92.0.113 port 23225 ssh2 Feb 13 05:46:28.990000 audit[2377]: USER_AUTH pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:29.083065 kernel: audit: type=1100 audit(1707803188.990:405): pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:31.124510 sshd[2377]: Failed password for root from 218.92.0.113 port 23225 ssh2 Feb 13 05:46:32.367000 audit[2377]: USER_AUTH pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:32.461066 kernel: audit: type=1100 audit(1707803192.367:406): pid=2377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 05:46:34.381777 sshd[2377]: Failed password for root from 218.92.0.113 port 23225 ssh2 Feb 13 05:46:35.744609 sshd[2377]: Received disconnect from 218.92.0.113 port 23225:11: [preauth] Feb 13 05:46:35.744609 sshd[2377]: Disconnected from authenticating user root 218.92.0.113 port 23225 [preauth] Feb 13 05:46:35.745148 sshd[2377]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 05:46:35.747186 systemd[1]: sshd@73-139.178.90.101:22-218.92.0.113:23225.service: Deactivated successfully. Feb 13 05:46:35.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-218.92.0.113:23225 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:35.840952 kernel: audit: type=1131 audit(1707803195.746:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.101:22-218.92.0.113:23225 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:42.837306 systemd[1]: Started sshd@74-139.178.90.101:22-218.92.0.24:25949.service. Feb 13 05:46:42.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-218.92.0.24:25949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:42.930937 kernel: audit: type=1130 audit(1707803202.836:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-218.92.0.24:25949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:44.679097 sshd[2382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:46:44.678000 audit[2382]: USER_AUTH pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:44.771059 kernel: audit: type=1100 audit(1707803204.678:409): pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:46.676907 sshd[2382]: Failed password for root from 218.92.0.24 port 25949 ssh2 Feb 13 05:46:48.054000 audit[2382]: USER_AUTH pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:48.146926 kernel: audit: type=1100 audit(1707803208.054:410): pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:50.599926 sshd[2382]: Failed password for root from 218.92.0.24 port 25949 ssh2 Feb 13 05:46:51.430000 audit[2382]: USER_AUTH pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:51.522879 kernel: audit: type=1100 audit(1707803211.430:411): pid=2382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:46:53.720037 sshd[2382]: Failed password for root from 218.92.0.24 port 25949 ssh2 Feb 13 05:46:54.806721 sshd[2382]: Received disconnect from 218.92.0.24 port 25949:11: [preauth] Feb 13 05:46:54.806721 sshd[2382]: Disconnected from authenticating user root 218.92.0.24 port 25949 [preauth] Feb 13 05:46:54.807284 sshd[2382]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:46:54.809337 systemd[1]: sshd@74-139.178.90.101:22-218.92.0.24:25949.service: Deactivated successfully. Feb 13 05:46:54.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-218.92.0.24:25949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:54.903058 kernel: audit: type=1131 audit(1707803214.808:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.101:22-218.92.0.24:25949 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:54.975449 systemd[1]: Started sshd@75-139.178.90.101:22-218.92.0.24:55404.service. Feb 13 05:46:54.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-218.92.0.24:55404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:55.067047 kernel: audit: type=1130 audit(1707803214.974:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-218.92.0.24:55404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:57.366520 systemd[1]: Started sshd@76-139.178.90.101:22-132.255.50.81:17008.service. Feb 13 05:46:57.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-132.255.50.81:17008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:57.458881 kernel: audit: type=1130 audit(1707803217.365:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-132.255.50.81:17008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:46:58.427615 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:46:58.427000 audit[2388]: USER_AUTH pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:46:58.519932 kernel: audit: type=1100 audit(1707803218.427:415): pid=2388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:47:00.345082 sshd[2388]: Failed password for root from 132.255.50.81 port 17008 ssh2 Feb 13 05:47:01.821473 sshd[2388]: Received disconnect from 132.255.50.81 port 17008:11: Bye Bye [preauth] Feb 13 05:47:01.821473 sshd[2388]: Disconnected from authenticating user root 132.255.50.81 port 17008 [preauth] Feb 13 05:47:01.823930 systemd[1]: sshd@76-139.178.90.101:22-132.255.50.81:17008.service: Deactivated successfully. Feb 13 05:47:01.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-132.255.50.81:17008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:01.918077 kernel: audit: type=1131 audit(1707803221.823:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.101:22-132.255.50.81:17008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:04.689996 systemd[1]: Started sshd@77-139.178.90.101:22-218.92.0.31:53437.service. Feb 13 05:47:04.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-218.92.0.31:53437 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:04.783070 kernel: audit: type=1130 audit(1707803224.689:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-218.92.0.31:53437 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:05.328398 systemd[1]: Started sshd@78-139.178.90.101:22-218.92.0.24:13930.service. Feb 13 05:47:05.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.24:13930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:05.420008 kernel: audit: type=1130 audit(1707803225.327:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.24:13930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:05.685836 sshd[2392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:05.685000 audit[2392]: USER_AUTH pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:05.784939 kernel: audit: type=1100 audit(1707803225.685:419): pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:07.563159 sshd[2392]: Failed password for root from 218.92.0.31 port 53437 ssh2 Feb 13 05:47:09.045000 audit[2392]: USER_AUTH pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:09.139063 kernel: audit: type=1100 audit(1707803229.045:420): pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:11.475394 sshd[2392]: Failed password for root from 218.92.0.31 port 53437 ssh2 Feb 13 05:47:12.405000 audit[2392]: USER_AUTH pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:12.498061 kernel: audit: type=1100 audit(1707803232.405:421): pid=2392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:14.579268 sshd[2392]: Failed password for root from 218.92.0.31 port 53437 ssh2 Feb 13 05:47:15.673913 systemd[1]: Started sshd@79-139.178.90.101:22-218.92.0.24:33839.service. Feb 13 05:47:15.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-218.92.0.24:33839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:15.766070 kernel: audit: type=1130 audit(1707803235.673:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-218.92.0.24:33839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:15.767310 sshd[2392]: Received disconnect from 218.92.0.31 port 53437:11: [preauth] Feb 13 05:47:15.767310 sshd[2392]: Disconnected from authenticating user root 218.92.0.31 port 53437 [preauth] Feb 13 05:47:15.767392 sshd[2392]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:15.767771 systemd[1]: sshd@77-139.178.90.101:22-218.92.0.31:53437.service: Deactivated successfully. Feb 13 05:47:15.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-218.92.0.31:53437 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:15.861032 kernel: audit: type=1131 audit(1707803235.766:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.101:22-218.92.0.31:53437 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:15.925884 systemd[1]: Started sshd@80-139.178.90.101:22-218.92.0.31:52900.service. Feb 13 05:47:15.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-218.92.0.31:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:16.019059 kernel: audit: type=1130 audit(1707803235.925:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-218.92.0.31:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:16.935658 sshd[2401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:16.935000 audit[2401]: USER_AUTH pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:17.029071 kernel: audit: type=1100 audit(1707803236.935:425): pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:18.657535 sshd[2401]: Failed password for root from 218.92.0.31 port 52900 ssh2 Feb 13 05:47:20.298000 audit[2401]: USER_AUTH pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:20.392055 kernel: audit: type=1100 audit(1707803240.298:426): pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:22.237114 sshd[2401]: Failed password for root from 218.92.0.31 port 52900 ssh2 Feb 13 05:47:23.662000 audit[2401]: USER_AUTH pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:23.756071 kernel: audit: type=1100 audit(1707803243.662:427): pid=2401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:26.012608 sshd[2401]: Failed password for root from 218.92.0.31 port 52900 ssh2 Feb 13 05:47:26.013013 systemd[1]: Started sshd@81-139.178.90.101:22-218.92.0.24:47040.service. Feb 13 05:47:26.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.24:47040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:26.105881 kernel: audit: type=1130 audit(1707803246.012:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.24:47040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:27.027660 sshd[2401]: Received disconnect from 218.92.0.31 port 52900:11: [preauth] Feb 13 05:47:27.027660 sshd[2401]: Disconnected from authenticating user root 218.92.0.31 port 52900 [preauth] Feb 13 05:47:27.028208 sshd[2401]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:27.030177 systemd[1]: sshd@80-139.178.90.101:22-218.92.0.31:52900.service: Deactivated successfully. Feb 13 05:47:27.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-218.92.0.31:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:27.056447 sshd[2404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:47:27.055000 audit[2404]: USER_AUTH pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:27.182119 systemd[1]: Started sshd@82-139.178.90.101:22-218.92.0.31:61955.service. Feb 13 05:47:27.215245 kernel: audit: type=1131 audit(1707803247.029:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.101:22-218.92.0.31:52900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:27.215333 kernel: audit: type=1100 audit(1707803247.055:430): pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:27.215347 kernel: audit: type=1130 audit(1707803247.181:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-218.92.0.31:61955 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:27.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-218.92.0.31:61955 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:28.188601 sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:28.187000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:28.281060 kernel: audit: type=1100 audit(1707803248.187:432): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:28.953813 sshd[2404]: Failed password for root from 218.92.0.24 port 47040 ssh2 Feb 13 05:47:30.226460 sshd[2408]: Failed password for root from 218.92.0.31 port 61955 ssh2 Feb 13 05:47:30.427000 audit[2404]: USER_AUTH pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:30.519927 kernel: audit: type=1100 audit(1707803250.427:433): pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:31.552000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:31.645062 kernel: audit: type=1100 audit(1707803251.552:434): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:33.072840 sshd[2404]: Failed password for root from 218.92.0.24 port 47040 ssh2 Feb 13 05:47:33.335025 sshd[2408]: Failed password for root from 218.92.0.31 port 61955 ssh2 Feb 13 05:47:33.798000 audit[2404]: USER_AUTH pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:33.890954 kernel: audit: type=1100 audit(1707803253.798:435): pid=2404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:34.917000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:35.010077 kernel: audit: type=1100 audit(1707803254.917:436): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.31 addr=218.92.0.31 terminal=ssh res=failed' Feb 13 05:47:36.188083 sshd[2404]: Failed password for root from 218.92.0.24 port 47040 ssh2 Feb 13 05:47:37.111248 sshd[2408]: Failed password for root from 218.92.0.31 port 61955 ssh2 Feb 13 05:47:37.169635 sshd[2404]: Received disconnect from 218.92.0.24 port 47040:11: [preauth] Feb 13 05:47:37.169635 sshd[2404]: Disconnected from authenticating user root 218.92.0.24 port 47040 [preauth] Feb 13 05:47:37.170162 sshd[2404]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:47:37.172140 systemd[1]: sshd@81-139.178.90.101:22-218.92.0.24:47040.service: Deactivated successfully. Feb 13 05:47:37.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.24:47040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:37.264933 kernel: audit: type=1131 audit(1707803257.171:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.101:22-218.92.0.24:47040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:37.324240 systemd[1]: Started sshd@83-139.178.90.101:22-218.92.0.24:64953.service. Feb 13 05:47:37.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-218.92.0.24:64953 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:37.416070 kernel: audit: type=1130 audit(1707803257.324:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-218.92.0.24:64953 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:38.282358 sshd[2408]: Received disconnect from 218.92.0.31 port 61955:11: [preauth] Feb 13 05:47:38.282358 sshd[2408]: Disconnected from authenticating user root 218.92.0.31 port 61955 [preauth] Feb 13 05:47:38.282914 sshd[2408]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.31 user=root Feb 13 05:47:38.284900 systemd[1]: sshd@82-139.178.90.101:22-218.92.0.31:61955.service: Deactivated successfully. Feb 13 05:47:38.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-218.92.0.31:61955 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:38.377880 kernel: audit: type=1131 audit(1707803258.284:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.101:22-218.92.0.31:61955 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:39.187518 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:47:39.185000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:39.279956 kernel: audit: type=1100 audit(1707803259.185:440): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:41.400865 sshd[2413]: Failed password for root from 218.92.0.24 port 64953 ssh2 Feb 13 05:47:42.550000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:42.644929 kernel: audit: type=1100 audit(1707803262.550:441): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:45.175263 sshd[2413]: Failed password for root from 218.92.0.24 port 64953 ssh2 Feb 13 05:47:45.915000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:46.010076 kernel: audit: type=1100 audit(1707803265.915:442): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 05:47:48.286763 sshd[2413]: Failed password for root from 218.92.0.24 port 64953 ssh2 Feb 13 05:47:49.282633 sshd[2413]: Received disconnect from 218.92.0.24 port 64953:11: [preauth] Feb 13 05:47:49.282633 sshd[2413]: Disconnected from authenticating user root 218.92.0.24 port 64953 [preauth] Feb 13 05:47:49.283178 sshd[2413]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 05:47:49.285280 systemd[1]: sshd@83-139.178.90.101:22-218.92.0.24:64953.service: Deactivated successfully. Feb 13 05:47:49.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-218.92.0.24:64953 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:49.377936 kernel: audit: type=1131 audit(1707803269.284:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.101:22-218.92.0.24:64953 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:56.314813 systemd[1]: Started sshd@84-139.178.90.101:22-218.92.0.118:12286.service. Feb 13 05:47:56.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-218.92.0.118:12286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:56.408076 kernel: audit: type=1130 audit(1707803276.314:444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-218.92.0.118:12286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:47:57.378560 sshd[2418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:47:57.377000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:47:57.471011 kernel: audit: type=1100 audit(1707803277.377:445): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:47:59.396447 sshd[2418]: Failed password for root from 218.92.0.118 port 12286 ssh2 Feb 13 05:48:00.758000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:00.852062 kernel: audit: type=1100 audit(1707803280.758:446): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:02.656194 systemd[1]: Started sshd@85-139.178.90.101:22-119.91.57.181:52560.service. Feb 13 05:48:02.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-119.91.57.181:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:02.739300 sshd[2421]: kex_exchange_identification: Connection closed by remote host Feb 13 05:48:02.739300 sshd[2421]: Connection closed by 119.91.57.181 port 52560 Feb 13 05:48:02.739501 systemd[1]: sshd@85-139.178.90.101:22-119.91.57.181:52560.service: Deactivated successfully. Feb 13 05:48:02.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-119.91.57.181:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:02.840692 kernel: audit: type=1130 audit(1707803282.655:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-119.91.57.181:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:02.840725 kernel: audit: type=1131 audit(1707803282.738:448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.101:22-119.91.57.181:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:03.188438 sshd[2418]: Failed password for root from 218.92.0.118 port 12286 ssh2 Feb 13 05:48:04.132000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:04.225938 kernel: audit: type=1100 audit(1707803284.132:449): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:06.778503 sshd[2418]: Failed password for root from 218.92.0.118 port 12286 ssh2 Feb 13 05:48:07.515504 sshd[2418]: Received disconnect from 218.92.0.118 port 12286:11: [preauth] Feb 13 05:48:07.515504 sshd[2418]: Disconnected from authenticating user root 218.92.0.118 port 12286 [preauth] Feb 13 05:48:07.516053 sshd[2418]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:48:07.518007 systemd[1]: sshd@84-139.178.90.101:22-218.92.0.118:12286.service: Deactivated successfully. Feb 13 05:48:07.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-218.92.0.118:12286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:07.610928 kernel: audit: type=1131 audit(1707803287.517:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.101:22-218.92.0.118:12286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:07.711140 systemd[1]: Started sshd@86-139.178.90.101:22-218.92.0.118:16093.service. Feb 13 05:48:07.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-218.92.0.118:16093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:07.804077 kernel: audit: type=1130 audit(1707803287.710:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-218.92.0.118:16093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:08.831909 sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:48:08.831000 audit[2426]: USER_AUTH pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:08.923897 kernel: audit: type=1100 audit(1707803288.831:452): pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:11.025151 sshd[2426]: Failed password for root from 218.92.0.118 port 16093 ssh2 Feb 13 05:48:12.223000 audit[2426]: USER_AUTH pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:12.317983 kernel: audit: type=1100 audit(1707803292.223:453): pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:14.301897 sshd[2426]: Failed password for root from 218.92.0.118 port 16093 ssh2 Feb 13 05:48:15.615000 audit[2426]: USER_AUTH pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:15.709078 kernel: audit: type=1100 audit(1707803295.615:454): pid=2426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:18.105699 sshd[2426]: Failed password for root from 218.92.0.118 port 16093 ssh2 Feb 13 05:48:19.001112 sshd[2426]: Received disconnect from 218.92.0.118 port 16093:11: [preauth] Feb 13 05:48:19.001112 sshd[2426]: Disconnected from authenticating user root 218.92.0.118 port 16093 [preauth] Feb 13 05:48:19.001632 sshd[2426]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:48:19.003632 systemd[1]: sshd@86-139.178.90.101:22-218.92.0.118:16093.service: Deactivated successfully. Feb 13 05:48:19.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-218.92.0.118:16093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:19.097076 kernel: audit: type=1131 audit(1707803299.003:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.101:22-218.92.0.118:16093 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:19.171719 systemd[1]: Started sshd@87-139.178.90.101:22-218.92.0.118:33458.service. Feb 13 05:48:19.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-218.92.0.118:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:19.264072 kernel: audit: type=1130 audit(1707803299.170:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-218.92.0.118:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:20.738285 sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:48:20.737000 audit[2430]: USER_AUTH pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:20.831046 kernel: audit: type=1100 audit(1707803300.737:457): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:22.912046 sshd[2430]: Failed password for root from 218.92.0.118 port 33458 ssh2 Feb 13 05:48:24.127000 audit[2430]: USER_AUTH pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:24.221081 kernel: audit: type=1100 audit(1707803304.127:458): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:26.185922 sshd[2430]: Failed password for root from 218.92.0.118 port 33458 ssh2 Feb 13 05:48:27.519000 audit[2430]: USER_AUTH pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:27.611060 kernel: audit: type=1100 audit(1707803307.519:459): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.118 addr=218.92.0.118 terminal=ssh res=failed' Feb 13 05:48:29.989065 sshd[2430]: Failed password for root from 218.92.0.118 port 33458 ssh2 Feb 13 05:48:30.899779 sshd[2430]: Received disconnect from 218.92.0.118 port 33458:11: [preauth] Feb 13 05:48:30.899779 sshd[2430]: Disconnected from authenticating user root 218.92.0.118 port 33458 [preauth] Feb 13 05:48:30.900290 sshd[2430]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Feb 13 05:48:30.902466 systemd[1]: sshd@87-139.178.90.101:22-218.92.0.118:33458.service: Deactivated successfully. Feb 13 05:48:30.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-218.92.0.118:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:30.994935 kernel: audit: type=1131 audit(1707803310.902:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.101:22-218.92.0.118:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:54.983327 sshd[2386]: Timeout before authentication for 218.92.0.24 port 55404 Feb 13 05:48:54.984734 systemd[1]: sshd@75-139.178.90.101:22-218.92.0.24:55404.service: Deactivated successfully. Feb 13 05:48:54.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-218.92.0.24:55404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:55.078078 kernel: audit: type=1131 audit(1707803334.984:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.101:22-218.92.0.24:55404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:57.358582 systemd[1]: Started sshd@88-139.178.90.101:22-2.57.122.87:45408.service. Feb 13 05:48:57.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-2.57.122.87:45408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:57.451071 kernel: audit: type=1130 audit(1707803337.357:462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-2.57.122.87:45408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:48:58.125527 sshd[2436]: Invalid user hqping from 2.57.122.87 port 45408 Feb 13 05:48:58.321036 sshd[2436]: pam_faillock(sshd:auth): User unknown Feb 13 05:48:58.322314 sshd[2436]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:48:58.322403 sshd[2436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:48:58.323336 sshd[2436]: pam_faillock(sshd:auth): User unknown Feb 13 05:48:58.322000 audit[2436]: USER_AUTH pid=2436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:48:58.416062 kernel: audit: type=1100 audit(1707803338.322:463): pid=2436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:49:00.381264 sshd[2436]: Failed password for invalid user hqping from 2.57.122.87 port 45408 ssh2 Feb 13 05:49:01.160622 sshd[2436]: Connection closed by invalid user hqping 2.57.122.87 port 45408 [preauth] Feb 13 05:49:01.163088 systemd[1]: sshd@88-139.178.90.101:22-2.57.122.87:45408.service: Deactivated successfully. Feb 13 05:49:01.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-2.57.122.87:45408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:01.256069 kernel: audit: type=1131 audit(1707803341.162:464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.101:22-2.57.122.87:45408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:03.571231 systemd[1]: Started sshd@89-139.178.90.101:22-132.255.50.81:15934.service. Feb 13 05:49:03.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-132.255.50.81:15934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:03.663883 kernel: audit: type=1130 audit(1707803343.570:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-132.255.50.81:15934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:04.714719 sshd[2440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:49:04.714000 audit[2440]: USER_AUTH pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:49:04.806924 kernel: audit: type=1100 audit(1707803344.714:466): pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:49:05.333618 sshd[2395]: Timeout before authentication for 218.92.0.24 port 13930 Feb 13 05:49:05.335088 systemd[1]: sshd@78-139.178.90.101:22-218.92.0.24:13930.service: Deactivated successfully. Feb 13 05:49:05.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.24:13930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:05.429090 kernel: audit: type=1131 audit(1707803345.334:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.101:22-218.92.0.24:13930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:06.928433 sshd[2440]: Failed password for root from 132.255.50.81 port 15934 ssh2 Feb 13 05:49:08.110986 sshd[2440]: Received disconnect from 132.255.50.81 port 15934:11: Bye Bye [preauth] Feb 13 05:49:08.110986 sshd[2440]: Disconnected from authenticating user root 132.255.50.81 port 15934 [preauth] Feb 13 05:49:08.113442 systemd[1]: sshd@89-139.178.90.101:22-132.255.50.81:15934.service: Deactivated successfully. Feb 13 05:49:08.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-132.255.50.81:15934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:08.207065 kernel: audit: type=1131 audit(1707803348.113:468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.101:22-132.255.50.81:15934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:15.679014 sshd[2398]: Timeout before authentication for 218.92.0.24 port 33839 Feb 13 05:49:15.680526 systemd[1]: sshd@79-139.178.90.101:22-218.92.0.24:33839.service: Deactivated successfully. Feb 13 05:49:15.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-218.92.0.24:33839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:49:15.774074 kernel: audit: type=1131 audit(1707803355.680:469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.101:22-218.92.0.24:33839 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:04.934563 systemd[1]: Started sshd@90-139.178.90.101:22-124.230.124.250:59288.service. Feb 13 05:50:04.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-124.230.124.250:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:05.028071 kernel: audit: type=1130 audit(1707803404.932:470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-124.230.124.250:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:30.460744 systemd[1]: Started sshd@91-139.178.90.101:22-104.250.49.150:36268.service. Feb 13 05:50:30.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-104.250.49.150:36268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:30.553952 kernel: audit: type=1130 audit(1707803430.459:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-104.250.49.150:36268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:33.204618 sshd[2451]: kex_exchange_identification: read: Connection reset by peer Feb 13 05:50:33.204618 sshd[2451]: Connection reset by 104.250.49.150 port 36268 Feb 13 05:50:33.206106 systemd[1]: sshd@91-139.178.90.101:22-104.250.49.150:36268.service: Deactivated successfully. Feb 13 05:50:33.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-104.250.49.150:36268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:50:33.300077 kernel: audit: type=1131 audit(1707803433.205:472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.101:22-104.250.49.150:36268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:05.583208 systemd[1]: Started sshd@92-139.178.90.101:22-132.255.50.81:54406.service. Feb 13 05:51:05.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-132.255.50.81:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:05.676880 kernel: audit: type=1130 audit(1707803465.582:473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-132.255.50.81:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:06.642354 sshd[2457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:51:06.641000 audit[2457]: USER_AUTH pid=2457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:51:06.735962 kernel: audit: type=1100 audit(1707803466.641:474): pid=2457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:51:08.605159 sshd[2457]: Failed password for root from 132.255.50.81 port 54406 ssh2 Feb 13 05:51:10.037034 sshd[2457]: Received disconnect from 132.255.50.81 port 54406:11: Bye Bye [preauth] Feb 13 05:51:10.037034 sshd[2457]: Disconnected from authenticating user root 132.255.50.81 port 54406 [preauth] Feb 13 05:51:10.039595 systemd[1]: sshd@92-139.178.90.101:22-132.255.50.81:54406.service: Deactivated successfully. Feb 13 05:51:10.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-132.255.50.81:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:10.133957 kernel: audit: type=1131 audit(1707803470.039:475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.101:22-132.255.50.81:54406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:11.121175 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:51:11.120Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2212} Feb 13 05:51:11.123676 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:51:11.123Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2212,"took":"2.225269ms"} Feb 13 05:51:36.405318 systemd[1]: Started sshd@93-139.178.90.101:22-141.98.11.11:26282.service. Feb 13 05:51:36.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-141.98.11.11:26282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:36.497922 kernel: audit: type=1130 audit(1707803496.404:476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-141.98.11.11:26282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:37.553917 sshd[2463]: Invalid user admin from 141.98.11.11 port 26282 Feb 13 05:51:37.824128 sshd[2463]: pam_faillock(sshd:auth): User unknown Feb 13 05:51:37.825247 sshd[2463]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:51:37.825337 sshd[2463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 13 05:51:37.826238 sshd[2463]: pam_faillock(sshd:auth): User unknown Feb 13 05:51:37.825000 audit[2463]: USER_AUTH pid=2463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 05:51:37.920075 kernel: audit: type=1100 audit(1707803497.825:477): pid=2463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 05:51:39.377164 sshd[2463]: Failed password for invalid user admin from 141.98.11.11 port 26282 ssh2 Feb 13 05:51:39.854977 sshd[2463]: Connection closed by invalid user admin 141.98.11.11 port 26282 [preauth] Feb 13 05:51:39.857460 systemd[1]: sshd@93-139.178.90.101:22-141.98.11.11:26282.service: Deactivated successfully. Feb 13 05:51:39.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-141.98.11.11:26282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:51:39.951081 kernel: audit: type=1131 audit(1707803499.857:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.101:22-141.98.11.11:26282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:04.939599 sshd[2446]: Timeout before authentication for 124.230.124.250 port 59288 Feb 13 05:52:04.941071 systemd[1]: sshd@90-139.178.90.101:22-124.230.124.250:59288.service: Deactivated successfully. Feb 13 05:52:04.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-124.230.124.250:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:05.035090 kernel: audit: type=1131 audit(1707803524.940:479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.101:22-124.230.124.250:59288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:08.311511 systemd[1]: Started sshd@94-139.178.90.101:22-124.230.124.250:2571.service. Feb 13 05:52:08.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-124.230.124.250:2571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:08.405074 kernel: audit: type=1130 audit(1707803528.310:480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-124.230.124.250:2571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:30.278792 systemd[1]: Started sshd@95-139.178.90.101:22-104.250.49.150:45939.service. Feb 13 05:52:30.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-104.250.49.150:45939 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:30.372075 kernel: audit: type=1130 audit(1707803550.276:481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-104.250.49.150:45939 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:31.954139 sshd[2474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:52:31.952000 audit[2474]: USER_AUTH pid=2474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:52:32.047061 kernel: audit: type=1100 audit(1707803551.952:482): pid=2474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:52:33.585103 sshd[2474]: Failed password for root from 104.250.49.150 port 45939 ssh2 Feb 13 05:52:35.310425 sshd[2474]: Received disconnect from 104.250.49.150 port 45939:11: Bye Bye [preauth] Feb 13 05:52:35.310425 sshd[2474]: Disconnected from authenticating user root 104.250.49.150 port 45939 [preauth] Feb 13 05:52:35.312917 systemd[1]: sshd@95-139.178.90.101:22-104.250.49.150:45939.service: Deactivated successfully. Feb 13 05:52:35.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-104.250.49.150:45939 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:52:35.407084 kernel: audit: type=1131 audit(1707803555.311:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.101:22-104.250.49.150:45939 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:08.693870 systemd[1]: Started sshd@96-139.178.90.101:22-132.255.50.81:37228.service. Feb 13 05:53:08.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-132.255.50.81:37228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:08.787073 kernel: audit: type=1130 audit(1707803588.693:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-132.255.50.81:37228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:09.759470 sshd[2481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:53:09.758000 audit[2481]: USER_AUTH pid=2481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:53:09.853057 kernel: audit: type=1100 audit(1707803589.758:485): pid=2481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:53:11.606989 sshd[2481]: Failed password for root from 132.255.50.81 port 37228 ssh2 Feb 13 05:53:13.154243 sshd[2481]: Received disconnect from 132.255.50.81 port 37228:11: Bye Bye [preauth] Feb 13 05:53:13.154243 sshd[2481]: Disconnected from authenticating user root 132.255.50.81 port 37228 [preauth] Feb 13 05:53:13.156737 systemd[1]: sshd@96-139.178.90.101:22-132.255.50.81:37228.service: Deactivated successfully. Feb 13 05:53:13.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-132.255.50.81:37228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:13.251076 kernel: audit: type=1131 audit(1707803593.156:486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.101:22-132.255.50.81:37228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:19.260010 systemd[1]: Started sshd@97-139.178.90.101:22-47.106.111.36:56526.service. Feb 13 05:53:19.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-47.106.111.36:56526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:19.352973 kernel: audit: type=1130 audit(1707803599.259:487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-47.106.111.36:56526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:22.193751 sshd[2487]: kex_exchange_identification: banner line contains invalid characters Feb 13 05:53:22.193751 sshd[2487]: banner exchange: Connection from 47.106.111.36 port 56526: invalid format Feb 13 05:53:22.195239 systemd[1]: sshd@97-139.178.90.101:22-47.106.111.36:56526.service: Deactivated successfully. Feb 13 05:53:22.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-47.106.111.36:56526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:53:22.289085 kernel: audit: type=1131 audit(1707803602.194:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.101:22-47.106.111.36:56526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:54:08.316571 sshd[2472]: Timeout before authentication for 124.230.124.250 port 2571 Feb 13 05:54:08.318062 systemd[1]: sshd@94-139.178.90.101:22-124.230.124.250:2571.service: Deactivated successfully. Feb 13 05:54:08.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-124.230.124.250:2571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:54:08.412091 kernel: audit: type=1131 audit(1707803648.317:489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.101:22-124.230.124.250:2571 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:55:04.932548 systemd[1]: Started sshd@98-139.178.90.101:22-132.255.50.81:11857.service. Feb 13 05:55:04.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-132.255.50.81:11857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:55:05.026096 kernel: audit: type=1130 audit(1707803704.930:490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-132.255.50.81:11857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:55:06.002496 sshd[2493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:55:06.000000 audit[2493]: USER_AUTH pid=2493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:55:06.095058 kernel: audit: type=1100 audit(1707803706.000:491): pid=2493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:55:08.246455 sshd[2493]: Failed password for root from 132.255.50.81 port 11857 ssh2 Feb 13 05:55:09.399267 sshd[2493]: Received disconnect from 132.255.50.81 port 11857:11: Bye Bye [preauth] Feb 13 05:55:09.399267 sshd[2493]: Disconnected from authenticating user root 132.255.50.81 port 11857 [preauth] Feb 13 05:55:09.401843 systemd[1]: sshd@98-139.178.90.101:22-132.255.50.81:11857.service: Deactivated successfully. Feb 13 05:55:09.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-132.255.50.81:11857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:55:09.496074 kernel: audit: type=1131 audit(1707803709.401:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.101:22-132.255.50.81:11857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:11.126465 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:56:11.126Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2764} Feb 13 05:56:11.129169 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T05:56:11.128Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2764,"took":"2.190494ms"} Feb 13 05:56:39.983059 systemd[1]: Started sshd@99-139.178.90.101:22-104.250.49.150:37029.service. Feb 13 05:56:39.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-104.250.49.150:37029 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:40.077063 kernel: audit: type=1130 audit(1707803799.982:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-104.250.49.150:37029 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:41.283209 sshd[2502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 05:56:41.282000 audit[2502]: USER_AUTH pid=2502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:56:41.374880 kernel: audit: type=1100 audit(1707803801.282:494): pid=2502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 05:56:43.235240 sshd[2502]: Failed password for root from 104.250.49.150 port 37029 ssh2 Feb 13 05:56:46.163577 sshd[2502]: Received disconnect from 104.250.49.150 port 37029:11: Bye Bye [preauth] Feb 13 05:56:46.163577 sshd[2502]: Disconnected from authenticating user root 104.250.49.150 port 37029 [preauth] Feb 13 05:56:46.166101 systemd[1]: sshd@99-139.178.90.101:22-104.250.49.150:37029.service: Deactivated successfully. Feb 13 05:56:46.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-104.250.49.150:37029 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:46.260075 kernel: audit: type=1131 audit(1707803806.165:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.101:22-104.250.49.150:37029 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:56.763416 systemd[1]: Started sshd@100-139.178.90.101:22-132.255.50.81:22038.service. Feb 13 05:56:56.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-132.255.50.81:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:56.856924 kernel: audit: type=1130 audit(1707803816.762:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-132.255.50.81:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:57.768566 sshd[2507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:56:57.767000 audit[2507]: USER_AUTH pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:56:57.861063 kernel: audit: type=1100 audit(1707803817.767:497): pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:56:59.249761 sshd[2507]: Failed password for root from 132.255.50.81 port 22038 ssh2 Feb 13 05:56:59.548271 sshd[2507]: Received disconnect from 132.255.50.81 port 22038:11: Bye Bye [preauth] Feb 13 05:56:59.548271 sshd[2507]: Disconnected from authenticating user root 132.255.50.81 port 22038 [preauth] Feb 13 05:56:59.550727 systemd[1]: sshd@100-139.178.90.101:22-132.255.50.81:22038.service: Deactivated successfully. Feb 13 05:56:59.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-132.255.50.81:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:56:59.645074 kernel: audit: type=1131 audit(1707803819.550:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.101:22-132.255.50.81:22038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:14.097009 systemd[1]: Started sshd@101-139.178.90.101:22-172.105.128.11:47346.service. Feb 13 05:57:14.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-172.105.128.11:47346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:14.190980 kernel: audit: type=1130 audit(1707803834.096:499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-172.105.128.11:47346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:17.992165 sshd[2511]: Connection closed by 172.105.128.11 port 47346 [preauth] Feb 13 05:57:17.994131 systemd[1]: sshd@101-139.178.90.101:22-172.105.128.11:47346.service: Deactivated successfully. Feb 13 05:57:17.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-172.105.128.11:47346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:18.063405 systemd[1]: Started sshd@102-139.178.90.101:22-172.105.128.11:47362.service. Feb 13 05:57:18.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-172.105.128.11:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:18.179316 kernel: audit: type=1131 audit(1707803837.993:500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.101:22-172.105.128.11:47346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:18.179352 kernel: audit: type=1130 audit(1707803838.062:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-172.105.128.11:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:20.975861 sshd[2515]: Connection closed by 172.105.128.11 port 47362 [preauth] Feb 13 05:57:20.977752 systemd[1]: sshd@102-139.178.90.101:22-172.105.128.11:47362.service: Deactivated successfully. Feb 13 05:57:20.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-172.105.128.11:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:21.054879 systemd[1]: Started sshd@103-139.178.90.101:22-172.105.128.11:10676.service. Feb 13 05:57:21.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-172.105.128.11:10676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:21.163745 kernel: audit: type=1131 audit(1707803840.977:502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.101:22-172.105.128.11:47362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:21.163778 kernel: audit: type=1130 audit(1707803841.054:503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-172.105.128.11:10676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:24.903935 sshd[2519]: Connection closed by 172.105.128.11 port 10676 [preauth] Feb 13 05:57:24.905949 systemd[1]: sshd@103-139.178.90.101:22-172.105.128.11:10676.service: Deactivated successfully. Feb 13 05:57:24.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-172.105.128.11:10676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:57:25.000067 kernel: audit: type=1131 audit(1707803844.905:504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.101:22-172.105.128.11:10676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:43.650376 systemd[1]: Started sshd@104-139.178.90.101:22-61.177.172.140:28329.service. Feb 13 05:58:43.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-61.177.172.140:28329 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:43.744077 kernel: audit: type=1130 audit(1707803923.649:505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-61.177.172.140:28329 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:44.661394 sshd[2527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:58:44.660000 audit[2527]: USER_AUTH pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:44.753064 kernel: audit: type=1100 audit(1707803924.660:506): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:46.167192 sshd[2527]: Failed password for root from 61.177.172.140 port 28329 ssh2 Feb 13 05:58:46.419000 audit[2527]: USER_AUTH pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:46.512944 kernel: audit: type=1100 audit(1707803926.419:507): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:47.432600 systemd[1]: Started sshd@105-139.178.90.101:22-132.255.50.81:57001.service. Feb 13 05:58:47.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-132.255.50.81:57001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:47.526064 kernel: audit: type=1130 audit(1707803927.432:508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-132.255.50.81:57001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:48.533443 sshd[2527]: Failed password for root from 61.177.172.140 port 28329 ssh2 Feb 13 05:58:48.548259 sshd[2531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 05:58:48.547000 audit[2531]: USER_AUTH pid=2531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:58:48.640926 kernel: audit: type=1100 audit(1707803928.547:509): pid=2531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 05:58:49.785000 audit[2527]: ANOM_LOGIN_FAILURES pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:49.786313 sshd[2527]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:58:49.785000 audit[2527]: USER_AUTH pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:49.943636 kernel: audit: type=2100 audit(1707803929.785:510): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:49.943669 kernel: audit: type=1100 audit(1707803929.785:511): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:50.601145 sshd[2531]: Failed password for root from 132.255.50.81 port 57001 ssh2 Feb 13 05:58:51.643687 sshd[2527]: Failed password for root from 61.177.172.140 port 28329 ssh2 Feb 13 05:58:51.936455 sshd[2531]: Received disconnect from 132.255.50.81 port 57001:11: Bye Bye [preauth] Feb 13 05:58:51.936455 sshd[2531]: Disconnected from authenticating user root 132.255.50.81 port 57001 [preauth] Feb 13 05:58:51.938792 systemd[1]: sshd@105-139.178.90.101:22-132.255.50.81:57001.service: Deactivated successfully. Feb 13 05:58:51.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-132.255.50.81:57001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:52.033065 kernel: audit: type=1131 audit(1707803931.938:512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.101:22-132.255.50.81:57001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:53.151629 sshd[2527]: Received disconnect from 61.177.172.140 port 28329:11: [preauth] Feb 13 05:58:53.151629 sshd[2527]: Disconnected from authenticating user root 61.177.172.140 port 28329 [preauth] Feb 13 05:58:53.152165 sshd[2527]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:58:53.154199 systemd[1]: sshd@104-139.178.90.101:22-61.177.172.140:28329.service: Deactivated successfully. Feb 13 05:58:53.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-61.177.172.140:28329 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:53.248072 kernel: audit: type=1131 audit(1707803933.153:513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.101:22-61.177.172.140:28329 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:53.321127 systemd[1]: Started sshd@106-139.178.90.101:22-61.177.172.140:31902.service. Feb 13 05:58:53.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-61.177.172.140:31902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:53.413879 kernel: audit: type=1130 audit(1707803933.320:514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-61.177.172.140:31902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:58:54.343689 sshd[2540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:58:54.343000 audit[2540]: USER_AUTH pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:54.437093 kernel: audit: type=1100 audit(1707803934.343:515): pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:56.888767 sshd[2540]: Failed password for root from 61.177.172.140 port 31902 ssh2 Feb 13 05:58:57.713000 audit[2540]: USER_AUTH pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:57.806913 kernel: audit: type=1100 audit(1707803937.713:516): pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:58:59.671530 sshd[2540]: Failed password for root from 61.177.172.140 port 31902 ssh2 Feb 13 05:59:01.081000 audit[2540]: USER_AUTH pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:01.173921 kernel: audit: type=1100 audit(1707803941.081:517): pid=2540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:02.920068 sshd[2540]: Failed password for root from 61.177.172.140 port 31902 ssh2 Feb 13 05:59:04.450245 sshd[2540]: Received disconnect from 61.177.172.140 port 31902:11: [preauth] Feb 13 05:59:04.450245 sshd[2540]: Disconnected from authenticating user root 61.177.172.140 port 31902 [preauth] Feb 13 05:59:04.450753 sshd[2540]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:59:04.452756 systemd[1]: sshd@106-139.178.90.101:22-61.177.172.140:31902.service: Deactivated successfully. Feb 13 05:59:04.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-61.177.172.140:31902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:04.545940 kernel: audit: type=1131 audit(1707803944.452:518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.101:22-61.177.172.140:31902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:04.600777 systemd[1]: Started sshd@107-139.178.90.101:22-61.177.172.140:47913.service. Feb 13 05:59:04.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-61.177.172.140:47913 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:04.693070 kernel: audit: type=1130 audit(1707803944.599:519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-61.177.172.140:47913 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:05.604412 sshd[2544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:59:05.603000 audit[2544]: USER_AUTH pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:05.696934 kernel: audit: type=1100 audit(1707803945.603:520): pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:07.993426 sshd[2544]: Failed password for root from 61.177.172.140 port 47913 ssh2 Feb 13 05:59:08.968000 audit[2544]: USER_AUTH pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:09.062072 kernel: audit: type=1100 audit(1707803948.968:521): pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:10.434616 sshd[2544]: Failed password for root from 61.177.172.140 port 47913 ssh2 Feb 13 05:59:10.725000 audit[2544]: USER_AUTH pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:10.820053 kernel: audit: type=1100 audit(1707803950.725:522): pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 05:59:11.630790 systemd[1]: Started sshd@108-139.178.90.101:22-2.57.122.87:41630.service. Feb 13 05:59:11.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-2.57.122.87:41630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:11.724077 kernel: audit: type=1130 audit(1707803951.630:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-2.57.122.87:41630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:12.442229 sshd[2547]: Invalid user hqping from 2.57.122.87 port 41630 Feb 13 05:59:12.638477 sshd[2547]: pam_faillock(sshd:auth): User unknown Feb 13 05:59:12.639592 sshd[2547]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:59:12.639680 sshd[2547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:59:12.640792 sshd[2547]: pam_faillock(sshd:auth): User unknown Feb 13 05:59:12.640000 audit[2547]: USER_AUTH pid=2547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:59:12.733971 kernel: audit: type=1100 audit(1707803952.640:524): pid=2547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:59:12.799591 sshd[2544]: Failed password for root from 61.177.172.140 port 47913 ssh2 Feb 13 05:59:14.092522 sshd[2544]: Received disconnect from 61.177.172.140 port 47913:11: [preauth] Feb 13 05:59:14.092522 sshd[2544]: Disconnected from authenticating user root 61.177.172.140 port 47913 [preauth] Feb 13 05:59:14.093044 sshd[2544]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 05:59:14.095098 systemd[1]: sshd@107-139.178.90.101:22-61.177.172.140:47913.service: Deactivated successfully. Feb 13 05:59:14.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-61.177.172.140:47913 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:14.187964 kernel: audit: type=1131 audit(1707803954.094:525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.101:22-61.177.172.140:47913 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:14.989254 sshd[2547]: Failed password for invalid user hqping from 2.57.122.87 port 41630 ssh2 Feb 13 05:59:15.474804 sshd[2547]: Connection closed by invalid user hqping 2.57.122.87 port 41630 [preauth] Feb 13 05:59:15.477333 systemd[1]: sshd@108-139.178.90.101:22-2.57.122.87:41630.service: Deactivated successfully. Feb 13 05:59:15.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-2.57.122.87:41630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:15.570070 kernel: audit: type=1131 audit(1707803955.476:526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.101:22-2.57.122.87:41630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:32.397314 systemd[1]: Started sshd@109-139.178.90.101:22-218.92.0.34:28746.service. Feb 13 05:59:32.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:28746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:32.490080 kernel: audit: type=1130 audit(1707803972.396:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:28746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:33.413696 sshd[2553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:59:33.413000 audit[2553]: USER_AUTH pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:33.505988 kernel: audit: type=1100 audit(1707803973.413:528): pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:35.311157 sshd[2553]: Failed password for root from 218.92.0.34 port 28746 ssh2 Feb 13 05:59:36.781000 audit[2553]: USER_AUTH pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:36.875050 kernel: audit: type=1100 audit(1707803976.781:529): pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:39.427278 sshd[2553]: Failed password for root from 218.92.0.34 port 28746 ssh2 Feb 13 05:59:40.148000 audit[2553]: USER_AUTH pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:40.240879 kernel: audit: type=1100 audit(1707803980.148:530): pid=2553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:42.342267 sshd[2553]: Failed password for root from 218.92.0.34 port 28746 ssh2 Feb 13 05:59:43.514913 sshd[2553]: Received disconnect from 218.92.0.34 port 28746:11: [preauth] Feb 13 05:59:43.514913 sshd[2553]: Disconnected from authenticating user root 218.92.0.34 port 28746 [preauth] Feb 13 05:59:43.515479 sshd[2553]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:59:43.517528 systemd[1]: sshd@109-139.178.90.101:22-218.92.0.34:28746.service: Deactivated successfully. Feb 13 05:59:43.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:28746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:43.611941 kernel: audit: type=1131 audit(1707803983.516:531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.101:22-218.92.0.34:28746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:43.671896 systemd[1]: Started sshd@110-139.178.90.101:22-218.92.0.34:38919.service. Feb 13 05:59:43.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-218.92.0.34:38919 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:43.763968 kernel: audit: type=1130 audit(1707803983.670:532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-218.92.0.34:38919 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:44.692856 sshd[2557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:59:44.691000 audit[2557]: USER_AUTH pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:44.786078 kernel: audit: type=1100 audit(1707803984.691:533): pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:46.434116 sshd[2557]: Failed password for root from 218.92.0.34 port 38919 ssh2 Feb 13 05:59:48.057000 audit[2557]: USER_AUTH pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:48.156880 kernel: audit: type=1100 audit(1707803988.057:534): pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:50.684186 sshd[2557]: Failed password for root from 218.92.0.34 port 38919 ssh2 Feb 13 05:59:51.424000 audit[2557]: USER_AUTH pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:51.519078 kernel: audit: type=1100 audit(1707803991.424:535): pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:53.128082 sshd[2557]: Failed password for root from 218.92.0.34 port 38919 ssh2 Feb 13 05:59:54.792747 sshd[2557]: Received disconnect from 218.92.0.34 port 38919:11: [preauth] Feb 13 05:59:54.792747 sshd[2557]: Disconnected from authenticating user root 218.92.0.34 port 38919 [preauth] Feb 13 05:59:54.793326 sshd[2557]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:59:54.795341 systemd[1]: sshd@110-139.178.90.101:22-218.92.0.34:38919.service: Deactivated successfully. Feb 13 05:59:54.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-218.92.0.34:38919 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:54.888975 kernel: audit: type=1131 audit(1707803994.794:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.101:22-218.92.0.34:38919 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:54.941245 systemd[1]: Started sshd@111-139.178.90.101:22-218.92.0.34:54086.service. Feb 13 05:59:54.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-218.92.0.34:54086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:55.033083 kernel: audit: type=1130 audit(1707803994.939:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-218.92.0.34:54086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:59:55.942460 sshd[2561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:59:55.941000 audit[2561]: USER_AUTH pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:56.033921 kernel: audit: type=1100 audit(1707803995.941:538): pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:58.527690 sshd[2561]: Failed password for root from 218.92.0.34 port 54086 ssh2 Feb 13 05:59:59.305000 audit[2561]: USER_AUTH pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:59:59.397065 kernel: audit: type=1100 audit(1707803999.305:539): pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 06:00:01.775447 sshd[2561]: Failed password for root from 218.92.0.34 port 54086 ssh2 Feb 13 06:00:02.669000 audit[2561]: USER_AUTH pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 06:00:02.762060 kernel: audit: type=1100 audit(1707804002.669:540): pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 06:00:04.216331 sshd[2561]: Failed password for root from 218.92.0.34 port 54086 ssh2 Feb 13 06:00:04.426703 sshd[2561]: Received disconnect from 218.92.0.34 port 54086:11: [preauth] Feb 13 06:00:04.426703 sshd[2561]: Disconnected from authenticating user root 218.92.0.34 port 54086 [preauth] Feb 13 06:00:04.427248 sshd[2561]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 06:00:04.429262 systemd[1]: sshd@111-139.178.90.101:22-218.92.0.34:54086.service: Deactivated successfully. Feb 13 06:00:04.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-218.92.0.34:54086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:04.523075 kernel: audit: type=1131 audit(1707804004.428:541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.101:22-218.92.0.34:54086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:39.395129 systemd[1]: Started sshd@112-139.178.90.101:22-132.255.50.81:32668.service. Feb 13 06:00:39.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-132.255.50.81:32668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:39.488064 kernel: audit: type=1130 audit(1707804039.394:542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-132.255.50.81:32668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:40.458748 sshd[2568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 06:00:40.458000 audit[2568]: USER_AUTH pid=2568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:00:40.550918 kernel: audit: type=1100 audit(1707804040.458:543): pid=2568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:00:42.220270 sshd[2568]: Failed password for root from 132.255.50.81 port 32668 ssh2 Feb 13 06:00:43.855155 sshd[2568]: Received disconnect from 132.255.50.81 port 32668:11: Bye Bye [preauth] Feb 13 06:00:43.855155 sshd[2568]: Disconnected from authenticating user root 132.255.50.81 port 32668 [preauth] Feb 13 06:00:43.857697 systemd[1]: sshd@112-139.178.90.101:22-132.255.50.81:32668.service: Deactivated successfully. Feb 13 06:00:43.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-132.255.50.81:32668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:43.951067 kernel: audit: type=1131 audit(1707804043.857:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.101:22-132.255.50.81:32668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:48.884005 systemd[1]: Started sshd@113-139.178.90.101:22-104.250.49.150:56357.service. Feb 13 06:00:48.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-104.250.49.150:56357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:48.976880 kernel: audit: type=1130 audit(1707804048.883:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-104.250.49.150:56357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:52.023230 sshd[2573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.49.150 user=root Feb 13 06:00:52.022000 audit[2573]: USER_AUTH pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 06:00:52.115926 kernel: audit: type=1100 audit(1707804052.022:546): pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.49.150 addr=104.250.49.150 terminal=ssh res=failed' Feb 13 06:00:53.765588 sshd[2573]: Failed password for root from 104.250.49.150 port 56357 ssh2 Feb 13 06:00:55.380045 sshd[2573]: Received disconnect from 104.250.49.150 port 56357:11: Bye Bye [preauth] Feb 13 06:00:55.380045 sshd[2573]: Disconnected from authenticating user root 104.250.49.150 port 56357 [preauth] Feb 13 06:00:55.382568 systemd[1]: sshd@113-139.178.90.101:22-104.250.49.150:56357.service: Deactivated successfully. Feb 13 06:00:55.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-104.250.49.150:56357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:00:55.475954 kernel: audit: type=1131 audit(1707804055.382:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.101:22-104.250.49.150:56357 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:01:11.131539 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:01:11.130Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":3316} Feb 13 06:01:11.134200 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:01:11.133Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":3316,"took":"2.229047ms"} Feb 13 06:02:36.588680 systemd[1]: Started sshd@114-139.178.90.101:22-132.255.50.81:57929.service. Feb 13 06:02:36.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-132.255.50.81:57929 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:02:36.681880 kernel: audit: type=1130 audit(1707804156.587:548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-132.255.50.81:57929 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:02:37.577770 sshd[2583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 06:02:37.577000 audit[2583]: USER_AUTH pid=2583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:02:37.670062 kernel: audit: type=1100 audit(1707804157.577:549): pid=2583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:02:39.736305 sshd[2583]: Failed password for root from 132.255.50.81 port 57929 ssh2 Feb 13 06:02:40.959609 sshd[2583]: Received disconnect from 132.255.50.81 port 57929:11: Bye Bye [preauth] Feb 13 06:02:40.959609 sshd[2583]: Disconnected from authenticating user root 132.255.50.81 port 57929 [preauth] Feb 13 06:02:40.962106 systemd[1]: sshd@114-139.178.90.101:22-132.255.50.81:57929.service: Deactivated successfully. Feb 13 06:02:40.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-132.255.50.81:57929 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:02:41.055976 kernel: audit: type=1131 audit(1707804160.961:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.101:22-132.255.50.81:57929 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:04:27.716360 systemd[1]: Started sshd@115-139.178.90.101:22-132.255.50.81:56527.service. Feb 13 06:04:27.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:56527 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:04:27.810074 kernel: audit: type=1130 audit(1707804267.715:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:56527 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:04:28.721005 sshd[2592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.50.81 user=root Feb 13 06:04:28.720000 audit[2592]: USER_AUTH pid=2592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:04:28.813897 kernel: audit: type=1100 audit(1707804268.720:552): pid=2592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=132.255.50.81 addr=132.255.50.81 terminal=ssh res=failed' Feb 13 06:04:30.783136 sshd[2592]: Failed password for root from 132.255.50.81 port 56527 ssh2 Feb 13 06:04:32.104902 sshd[2592]: Received disconnect from 132.255.50.81 port 56527:11: Bye Bye [preauth] Feb 13 06:04:32.104902 sshd[2592]: Disconnected from authenticating user root 132.255.50.81 port 56527 [preauth] Feb 13 06:04:32.107376 systemd[1]: sshd@115-139.178.90.101:22-132.255.50.81:56527.service: Deactivated successfully. Feb 13 06:04:32.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:56527 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:04:32.200938 kernel: audit: type=1131 audit(1707804272.107:553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.101:22-132.255.50.81:56527 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:08.424129 systemd[1]: Started sshd@116-139.178.90.101:22-218.92.0.27:38969.service. Feb 13 06:05:08.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-218.92.0.27:38969 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:08.518078 kernel: audit: type=1130 audit(1707804308.423:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-218.92.0.27:38969 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:09.936720 sshd[2598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:09.936000 audit[2598]: USER_AUTH pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:10.030081 kernel: audit: type=1100 audit(1707804309.936:555): pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:11.628591 sshd[2598]: Failed password for root from 218.92.0.27 port 38969 ssh2 Feb 13 06:05:13.319000 audit[2598]: USER_AUTH pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:13.412931 kernel: audit: type=1100 audit(1707804313.319:556): pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:15.227849 sshd[2598]: Failed password for root from 218.92.0.27 port 38969 ssh2 Feb 13 06:05:16.689000 audit[2598]: USER_AUTH pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:16.780908 kernel: audit: type=1100 audit(1707804316.689:557): pid=2598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:18.341248 sshd[2598]: Failed password for root from 218.92.0.27 port 38969 ssh2 Feb 13 06:05:20.067363 sshd[2598]: Received disconnect from 218.92.0.27 port 38969:11: [preauth] Feb 13 06:05:20.067363 sshd[2598]: Disconnected from authenticating user root 218.92.0.27 port 38969 [preauth] Feb 13 06:05:20.067901 sshd[2598]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:20.070052 systemd[1]: sshd@116-139.178.90.101:22-218.92.0.27:38969.service: Deactivated successfully. Feb 13 06:05:20.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-218.92.0.27:38969 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:20.163075 kernel: audit: type=1131 audit(1707804320.069:558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.101:22-218.92.0.27:38969 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:20.249703 systemd[1]: Started sshd@117-139.178.90.101:22-218.92.0.27:44922.service. Feb 13 06:05:20.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-218.92.0.27:44922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:20.342066 kernel: audit: type=1130 audit(1707804320.249:559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-218.92.0.27:44922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:21.329779 sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:21.329000 audit[2602]: ANOM_LOGIN_FAILURES pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:21.330088 sshd[2602]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:05:21.329000 audit[2602]: USER_AUTH pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:21.485795 kernel: audit: type=2100 audit(1707804321.329:560): pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:21.485825 kernel: audit: type=1100 audit(1707804321.329:561): pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:23.001905 sshd[2602]: Failed password for root from 218.92.0.27 port 44922 ssh2 Feb 13 06:05:24.706000 audit[2602]: USER_AUTH pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:24.799059 kernel: audit: type=1100 audit(1707804324.706:562): pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:26.791360 sshd[2602]: Failed password for root from 218.92.0.27 port 44922 ssh2 Feb 13 06:05:28.091000 audit[2602]: USER_AUTH pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:28.184056 kernel: audit: type=1100 audit(1707804328.091:563): pid=2602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:29.724798 sshd[2602]: Failed password for root from 218.92.0.27 port 44922 ssh2 Feb 13 06:05:31.462178 sshd[2602]: Received disconnect from 218.92.0.27 port 44922:11: [preauth] Feb 13 06:05:31.462178 sshd[2602]: Disconnected from authenticating user root 218.92.0.27 port 44922 [preauth] Feb 13 06:05:31.462726 sshd[2602]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:31.464778 systemd[1]: sshd@117-139.178.90.101:22-218.92.0.27:44922.service: Deactivated successfully. Feb 13 06:05:31.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-218.92.0.27:44922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:31.556935 kernel: audit: type=1131 audit(1707804331.463:564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.90.101:22-218.92.0.27:44922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:31.600414 systemd[1]: Started sshd@118-139.178.90.101:22-218.92.0.27:54891.service. Feb 13 06:05:31.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-218.92.0.27:54891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:31.691947 kernel: audit: type=1130 audit(1707804331.598:565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-218.92.0.27:54891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:32.634960 sshd[2609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:32.633000 audit[2609]: USER_AUTH pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:32.726062 kernel: audit: type=1100 audit(1707804332.633:566): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:34.151117 sshd[2609]: Failed password for root from 218.92.0.27 port 54891 ssh2 Feb 13 06:05:34.399000 audit[2609]: USER_AUTH pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:34.492936 kernel: audit: type=1100 audit(1707804334.399:567): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:36.524793 sshd[2609]: Failed password for root from 218.92.0.27 port 54891 ssh2 Feb 13 06:05:37.757000 audit[2609]: USER_AUTH pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:37.851067 kernel: audit: type=1100 audit(1707804337.757:568): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:05:39.626240 sshd[2609]: Failed password for root from 218.92.0.27 port 54891 ssh2 Feb 13 06:05:41.134274 sshd[2609]: Received disconnect from 218.92.0.27 port 54891:11: [preauth] Feb 13 06:05:41.134274 sshd[2609]: Disconnected from authenticating user root 218.92.0.27 port 54891 [preauth] Feb 13 06:05:41.134790 sshd[2609]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:05:41.136786 systemd[1]: sshd@118-139.178.90.101:22-218.92.0.27:54891.service: Deactivated successfully. Feb 13 06:05:41.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-218.92.0.27:54891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:05:41.230075 kernel: audit: type=1131 audit(1707804341.136:569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.90.101:22-218.92.0.27:54891 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:06:11.133806 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:06:11.133Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":3868} Feb 13 06:06:11.136537 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:06:11.136Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":3868,"took":"2.556386ms"} Feb 13 06:07:34.814259 systemd[1]: Started sshd@119-139.178.90.101:22-218.92.0.22:41971.service. Feb 13 06:07:34.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-218.92.0.22:41971 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:34.906881 kernel: audit: type=1130 audit(1707804454.812:570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-218.92.0.22:41971 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:35.888008 sshd[2617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:07:35.886000 audit[2617]: USER_AUTH pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:35.980058 kernel: audit: type=1100 audit(1707804455.886:571): pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:37.956306 sshd[2617]: Failed password for root from 218.92.0.22 port 41971 ssh2 Feb 13 06:07:39.257000 audit[2617]: USER_AUTH pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:39.353087 kernel: audit: type=1100 audit(1707804459.257:572): pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:40.876034 sshd[2617]: Failed password for root from 218.92.0.22 port 41971 ssh2 Feb 13 06:07:42.628000 audit[2617]: USER_AUTH pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:42.723067 kernel: audit: type=1100 audit(1707804462.628:573): pid=2617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:43.995160 sshd[2617]: Failed password for root from 218.92.0.22 port 41971 ssh2 Feb 13 06:07:44.400458 sshd[2617]: Received disconnect from 218.92.0.22 port 41971:11: [preauth] Feb 13 06:07:44.400458 sshd[2617]: Disconnected from authenticating user root 218.92.0.22 port 41971 [preauth] Feb 13 06:07:44.401037 sshd[2617]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:07:44.403094 systemd[1]: sshd@119-139.178.90.101:22-218.92.0.22:41971.service: Deactivated successfully. Feb 13 06:07:44.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-218.92.0.22:41971 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:44.496950 kernel: audit: type=1131 audit(1707804464.402:574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.90.101:22-218.92.0.22:41971 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:44.569808 systemd[1]: Started sshd@120-139.178.90.101:22-218.92.0.22:51110.service. Feb 13 06:07:44.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-218.92.0.22:51110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:44.661016 kernel: audit: type=1130 audit(1707804464.568:575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-218.92.0.22:51110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:45.675170 sshd[2623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:07:45.674000 audit[2623]: USER_AUTH pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:45.766942 kernel: audit: type=1100 audit(1707804465.674:576): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:48.119229 sshd[2623]: Failed password for root from 218.92.0.22 port 51110 ssh2 Feb 13 06:07:49.045000 audit[2623]: ANOM_LOGIN_FAILURES pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:49.046805 sshd[2623]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:07:49.046000 audit[2623]: USER_AUTH pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:49.200583 kernel: audit: type=2100 audit(1707804469.045:577): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:49.200609 kernel: audit: type=1100 audit(1707804469.046:578): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:51.039215 sshd[2623]: Failed password for root from 218.92.0.22 port 51110 ssh2 Feb 13 06:07:52.417000 audit[2623]: USER_AUTH pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:52.511060 kernel: audit: type=1100 audit(1707804472.417:579): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:54.490768 sshd[2623]: Failed password for root from 218.92.0.22 port 51110 ssh2 Feb 13 06:07:55.794253 sshd[2623]: Received disconnect from 218.92.0.22 port 51110:11: [preauth] Feb 13 06:07:55.794253 sshd[2623]: Disconnected from authenticating user root 218.92.0.22 port 51110 [preauth] Feb 13 06:07:55.794781 sshd[2623]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:07:55.796929 systemd[1]: sshd@120-139.178.90.101:22-218.92.0.22:51110.service: Deactivated successfully. Feb 13 06:07:55.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-218.92.0.22:51110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:55.891079 kernel: audit: type=1131 audit(1707804475.796:580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.90.101:22-218.92.0.22:51110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:55.954356 systemd[1]: Started sshd@121-139.178.90.101:22-218.92.0.22:16360.service. Feb 13 06:07:55.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-218.92.0.22:16360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:56.046073 kernel: audit: type=1130 audit(1707804475.953:581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-218.92.0.22:16360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:07:57.031937 sshd[2627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:07:57.031000 audit[2627]: USER_AUTH pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:57.125075 kernel: audit: type=1100 audit(1707804477.031:582): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:07:59.456123 sshd[2627]: Failed password for root from 218.92.0.22 port 16360 ssh2 Feb 13 06:08:00.402000 audit[2627]: USER_AUTH pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:08:00.495054 kernel: audit: type=1100 audit(1707804480.402:583): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:08:02.571151 sshd[2627]: Failed password for root from 218.92.0.22 port 16360 ssh2 Feb 13 06:08:03.779000 audit[2627]: USER_AUTH pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:08:03.871926 kernel: audit: type=1100 audit(1707804483.779:584): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:08:05.361468 sshd[2627]: Failed password for root from 218.92.0.22 port 16360 ssh2 Feb 13 06:08:05.551265 sshd[2627]: Received disconnect from 218.92.0.22 port 16360:11: [preauth] Feb 13 06:08:05.551265 sshd[2627]: Disconnected from authenticating user root 218.92.0.22 port 16360 [preauth] Feb 13 06:08:05.551770 sshd[2627]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:08:05.553795 systemd[1]: sshd@121-139.178.90.101:22-218.92.0.22:16360.service: Deactivated successfully. Feb 13 06:08:05.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-218.92.0.22:16360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:08:05.646936 kernel: audit: type=1131 audit(1707804485.553:585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.90.101:22-218.92.0.22:16360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:12.002205 systemd[1]: Started sshd@122-139.178.90.101:22-141.98.11.11:48290.service. Feb 13 06:09:12.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-141.98.11.11:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:12.096074 kernel: audit: type=1130 audit(1707804552.001:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-141.98.11.11:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:13.051780 sshd[2634]: Invalid user RPM from 141.98.11.11 port 48290 Feb 13 06:09:13.229789 sshd[2634]: pam_faillock(sshd:auth): User unknown Feb 13 06:09:13.231002 sshd[2634]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:09:13.231100 sshd[2634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 13 06:09:13.231991 sshd[2634]: pam_faillock(sshd:auth): User unknown Feb 13 06:09:13.231000 audit[2634]: USER_AUTH pid=2634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="RPM" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 06:09:13.325086 kernel: audit: type=1100 audit(1707804553.231:587): pid=2634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="RPM" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 06:09:15.088814 sshd[2634]: Failed password for invalid user RPM from 141.98.11.11 port 48290 ssh2 Feb 13 06:09:16.471153 sshd[2634]: Connection closed by invalid user RPM 141.98.11.11 port 48290 [preauth] Feb 13 06:09:16.473672 systemd[1]: sshd@122-139.178.90.101:22-141.98.11.11:48290.service: Deactivated successfully. Feb 13 06:09:16.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-141.98.11.11:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:16.566917 kernel: audit: type=1131 audit(1707804556.473:588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.90.101:22-141.98.11.11:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:27.010822 systemd[1]: Started sshd@123-139.178.90.101:22-2.57.122.87:52406.service. Feb 13 06:09:27.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-2.57.122.87:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:27.103925 kernel: audit: type=1130 audit(1707804567.010:589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-2.57.122.87:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:27.823731 sshd[2638]: Invalid user hqping from 2.57.122.87 port 52406 Feb 13 06:09:28.030829 sshd[2638]: pam_faillock(sshd:auth): User unknown Feb 13 06:09:28.031836 sshd[2638]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:09:28.031948 sshd[2638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 06:09:28.032848 sshd[2638]: pam_faillock(sshd:auth): User unknown Feb 13 06:09:28.032000 audit[2638]: USER_AUTH pid=2638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:09:28.127085 kernel: audit: type=1100 audit(1707804568.032:590): pid=2638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:09:29.949144 sshd[2638]: Failed password for invalid user hqping from 2.57.122.87 port 52406 ssh2 Feb 13 06:09:30.867921 sshd[2638]: Connection closed by invalid user hqping 2.57.122.87 port 52406 [preauth] Feb 13 06:09:30.870457 systemd[1]: sshd@123-139.178.90.101:22-2.57.122.87:52406.service: Deactivated successfully. Feb 13 06:09:30.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-2.57.122.87:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:09:30.964073 kernel: audit: type=1131 audit(1707804570.870:591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.90.101:22-2.57.122.87:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:11:11.135776 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:11:11.135Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":4444} Feb 13 06:11:11.138402 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:11:11.137Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":4444,"took":"2.306492ms"} Feb 13 06:11:55.445399 update_engine[1458]: I0213 06:11:55.445286 1458 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 06:11:55.445399 update_engine[1458]: I0213 06:11:55.445363 1458 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446059 1458 omaha_request_params.cc:62] Current group set to lts Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446254 1458 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446267 1458 update_attempter.cc:643] Scheduling an action processor start. Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446300 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446496 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446514 1458 omaha_request_action.cc:271] Request: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: Feb 13 06:11:55.446523 update_engine[1458]: I0213 06:11:55.446525 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 06:11:55.447936 update_engine[1458]: I0213 06:11:55.447027 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 06:11:55.447936 update_engine[1458]: E0213 06:11:55.447253 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 06:11:55.447936 update_engine[1458]: I0213 06:11:55.447369 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 06:11:55.448241 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 06:12:05.438928 update_engine[1458]: I0213 06:12:05.438761 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 06:12:05.439731 update_engine[1458]: I0213 06:12:05.439240 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 06:12:05.439731 update_engine[1458]: E0213 06:12:05.439431 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 06:12:05.439731 update_engine[1458]: I0213 06:12:05.439553 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 06:12:15.438835 update_engine[1458]: I0213 06:12:15.438712 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 06:12:15.439652 update_engine[1458]: I0213 06:12:15.439179 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 06:12:15.439652 update_engine[1458]: E0213 06:12:15.439385 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 06:12:15.439652 update_engine[1458]: I0213 06:12:15.439510 1458 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 06:12:25.429534 update_engine[1458]: I0213 06:12:25.429416 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.429831 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 06:12:25.430381 update_engine[1458]: E0213 06:12:25.430058 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430169 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430183 1458 omaha_request_action.cc:621] Omaha request response: Feb 13 06:12:25.430381 update_engine[1458]: E0213 06:12:25.430294 1458 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430320 1458 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430328 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430336 1458 update_attempter.cc:306] Processing Done. Feb 13 06:12:25.430381 update_engine[1458]: E0213 06:12:25.430361 1458 update_attempter.cc:619] Update failed. Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430371 1458 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430379 1458 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 06:12:25.430381 update_engine[1458]: I0213 06:12:25.430389 1458 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.430546 1458 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.430596 1458 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.430606 1458 omaha_request_action.cc:271] Request: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.430616 1458 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.430857 1458 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 06:12:25.431556 update_engine[1458]: E0213 06:12:25.431048 1458 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431170 1458 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431190 1458 omaha_request_action.cc:621] Omaha request response: Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431201 1458 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431210 1458 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431217 1458 update_attempter.cc:306] Processing Done. Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431224 1458 update_attempter.cc:310] Error event sent. Feb 13 06:12:25.431556 update_engine[1458]: I0213 06:12:25.431248 1458 update_check_scheduler.cc:74] Next update check in 44m41s Feb 13 06:12:25.433315 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 06:12:25.433315 locksmithd[1502]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 06:14:36.467809 systemd[1]: Started sshd@124-139.178.90.101:22-61.177.172.140:22830.service. Feb 13 06:14:36.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-61.177.172.140:22830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:36.561088 kernel: audit: type=1130 audit(1707804876.467:592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-61.177.172.140:22830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:37.428391 sshd[2653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:14:37.427000 audit[2653]: USER_AUTH pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:37.522062 kernel: audit: type=1100 audit(1707804877.427:593): pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:39.431206 sshd[2653]: Failed password for root from 61.177.172.140 port 22830 ssh2 Feb 13 06:14:40.785000 audit[2653]: USER_AUTH pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:40.878930 kernel: audit: type=1100 audit(1707804880.785:594): pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:42.868517 sshd[2653]: Failed password for root from 61.177.172.140 port 22830 ssh2 Feb 13 06:14:44.142000 audit[2653]: USER_AUTH pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:44.234927 kernel: audit: type=1100 audit(1707804884.142:595): pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:45.774014 sshd[2653]: Failed password for root from 61.177.172.140 port 22830 ssh2 Feb 13 06:14:47.499650 sshd[2653]: Received disconnect from 61.177.172.140 port 22830:11: [preauth] Feb 13 06:14:47.499650 sshd[2653]: Disconnected from authenticating user root 61.177.172.140 port 22830 [preauth] Feb 13 06:14:47.500201 sshd[2653]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:14:47.502268 systemd[1]: sshd@124-139.178.90.101:22-61.177.172.140:22830.service: Deactivated successfully. Feb 13 06:14:47.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-61.177.172.140:22830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:47.596060 kernel: audit: type=1131 audit(1707804887.502:596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.90.101:22-61.177.172.140:22830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:47.668035 systemd[1]: Started sshd@125-139.178.90.101:22-61.177.172.140:39767.service. Feb 13 06:14:47.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-61.177.172.140:39767 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:47.759880 kernel: audit: type=1130 audit(1707804887.667:597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-61.177.172.140:39767 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:48.698645 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:14:48.698000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:48.790927 kernel: audit: type=1100 audit(1707804888.698:598): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:50.545231 sshd[2658]: Failed password for root from 61.177.172.140 port 39767 ssh2 Feb 13 06:14:52.066000 audit[2658]: ANOM_LOGIN_FAILURES pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:52.067265 sshd[2658]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:14:52.066000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:52.223324 kernel: audit: type=2100 audit(1707804892.066:599): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:52.223355 kernel: audit: type=1100 audit(1707804892.066:600): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:54.129027 sshd[2658]: Failed password for root from 61.177.172.140 port 39767 ssh2 Feb 13 06:14:55.435000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:55.529071 kernel: audit: type=1100 audit(1707804895.435:601): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:55.669007 systemd[1]: Started sshd@126-139.178.90.101:22-218.92.0.76:10753.service. Feb 13 06:14:55.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-218.92.0.76:10753 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:55.761929 kernel: audit: type=1130 audit(1707804895.668:602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-218.92.0.76:10753 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:56.643827 sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:14:56.643000 audit[2661]: USER_AUTH pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:14:56.737079 kernel: audit: type=1100 audit(1707804896.643:603): pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:14:57.242575 sshd[2658]: Failed password for root from 61.177.172.140 port 39767 ssh2 Feb 13 06:14:58.254940 sshd[2661]: Failed password for root from 218.92.0.76 port 10753 ssh2 Feb 13 06:14:58.803665 sshd[2658]: Received disconnect from 61.177.172.140 port 39767:11: [preauth] Feb 13 06:14:58.803665 sshd[2658]: Disconnected from authenticating user root 61.177.172.140 port 39767 [preauth] Feb 13 06:14:58.804376 sshd[2658]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:14:58.806498 systemd[1]: sshd@125-139.178.90.101:22-61.177.172.140:39767.service: Deactivated successfully. Feb 13 06:14:58.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-61.177.172.140:39767 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:58.899942 kernel: audit: type=1131 audit(1707804898.806:604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.90.101:22-61.177.172.140:39767 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:58.940115 systemd[1]: Started sshd@127-139.178.90.101:22-61.177.172.140:59936.service. Feb 13 06:14:58.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-61.177.172.140:59936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:59.033019 kernel: audit: type=1130 audit(1707804898.939:605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-61.177.172.140:59936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:14:59.901470 sshd[2666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:14:59.900000 audit[2666]: USER_AUTH pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:14:59.993954 kernel: audit: type=1100 audit(1707804899.900:606): pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:15:00.000000 audit[2661]: USER_AUTH pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:00.093085 kernel: audit: type=1100 audit(1707804900.000:607): pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:01.828551 sshd[2661]: Failed password for root from 218.92.0.76 port 10753 ssh2 Feb 13 06:15:02.591613 sshd[2666]: Failed password for root from 61.177.172.140 port 59936 ssh2 Feb 13 06:15:03.258000 audit[2666]: USER_AUTH pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:15:03.352043 kernel: audit: type=1100 audit(1707804903.258:608): pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:15:03.358000 audit[2661]: USER_AUTH pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:03.451076 kernel: audit: type=1100 audit(1707804903.358:609): pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:05.165596 sshd[2666]: Failed password for root from 61.177.172.140 port 59936 ssh2 Feb 13 06:15:05.266408 sshd[2661]: Failed password for root from 218.92.0.76 port 10753 ssh2 Feb 13 06:15:06.615000 audit[2666]: USER_AUTH pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:15:06.709065 kernel: audit: type=1100 audit(1707804906.615:610): pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.140 addr=61.177.172.140 terminal=ssh res=failed' Feb 13 06:15:06.719740 sshd[2661]: Received disconnect from 218.92.0.76 port 10753:11: [preauth] Feb 13 06:15:06.719740 sshd[2661]: Disconnected from authenticating user root 218.92.0.76 port 10753 [preauth] Feb 13 06:15:06.719945 sshd[2661]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:15:06.720457 systemd[1]: sshd@126-139.178.90.101:22-218.92.0.76:10753.service: Deactivated successfully. Feb 13 06:15:06.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-218.92.0.76:10753 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:06.813064 kernel: audit: type=1131 audit(1707804906.719:611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.90.101:22-218.92.0.76:10753 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:06.887741 systemd[1]: Started sshd@128-139.178.90.101:22-218.92.0.76:14434.service. Feb 13 06:15:06.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-218.92.0.76:14434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:06.979897 kernel: audit: type=1130 audit(1707804906.887:612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-218.92.0.76:14434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:07.914465 sshd[2670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:15:07.913000 audit[2670]: USER_AUTH pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:08.006930 kernel: audit: type=1100 audit(1707804907.913:613): pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:08.267274 sshd[2666]: Failed password for root from 61.177.172.140 port 59936 ssh2 Feb 13 06:15:09.369073 sshd[2670]: Failed password for root from 218.92.0.76 port 14434 ssh2 Feb 13 06:15:09.675000 audit[2670]: USER_AUTH pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:09.768952 kernel: audit: type=1100 audit(1707804909.675:614): pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:09.973141 sshd[2666]: Received disconnect from 61.177.172.140 port 59936:11: [preauth] Feb 13 06:15:09.973141 sshd[2666]: Disconnected from authenticating user root 61.177.172.140 port 59936 [preauth] Feb 13 06:15:09.973768 sshd[2666]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140 user=root Feb 13 06:15:09.975734 systemd[1]: sshd@127-139.178.90.101:22-61.177.172.140:59936.service: Deactivated successfully. Feb 13 06:15:09.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-61.177.172.140:59936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:10.068960 kernel: audit: type=1131 audit(1707804909.975:615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.90.101:22-61.177.172.140:59936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:11.738995 sshd[2670]: Failed password for root from 218.92.0.76 port 14434 ssh2 Feb 13 06:15:13.043000 audit[2670]: USER_AUTH pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:13.137177 kernel: audit: type=1100 audit(1707804913.043:616): pid=2670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:14.991347 sshd[2670]: Failed password for root from 218.92.0.76 port 14434 ssh2 Feb 13 06:15:16.411566 sshd[2670]: Received disconnect from 218.92.0.76 port 14434:11: [preauth] Feb 13 06:15:16.411566 sshd[2670]: Disconnected from authenticating user root 218.92.0.76 port 14434 [preauth] Feb 13 06:15:16.412146 sshd[2670]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:15:16.414230 systemd[1]: sshd@128-139.178.90.101:22-218.92.0.76:14434.service: Deactivated successfully. Feb 13 06:15:16.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-218.92.0.76:14434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:16.508060 kernel: audit: type=1131 audit(1707804916.413:617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.90.101:22-218.92.0.76:14434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:16.544946 systemd[1]: Started sshd@129-139.178.90.101:22-218.92.0.76:60388.service. Feb 13 06:15:16.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-218.92.0.76:60388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:16.637071 kernel: audit: type=1130 audit(1707804916.544:618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-218.92.0.76:60388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:17.497601 sshd[2675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:15:17.497000 audit[2675]: USER_AUTH pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:17.588941 kernel: audit: type=1100 audit(1707804917.497:619): pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:19.660399 sshd[2675]: Failed password for root from 218.92.0.76 port 60388 ssh2 Feb 13 06:15:20.853000 audit[2675]: USER_AUTH pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:20.946064 kernel: audit: type=1100 audit(1707804920.853:620): pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:23.428154 sshd[2675]: Failed password for root from 218.92.0.76 port 60388 ssh2 Feb 13 06:15:24.209000 audit[2675]: USER_AUTH pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:24.301932 kernel: audit: type=1100 audit(1707804924.209:621): pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 06:15:25.665513 sshd[2675]: Failed password for root from 218.92.0.76 port 60388 ssh2 Feb 13 06:15:25.959241 sshd[2675]: Received disconnect from 218.92.0.76 port 60388:11: [preauth] Feb 13 06:15:25.959241 sshd[2675]: Disconnected from authenticating user root 218.92.0.76 port 60388 [preauth] Feb 13 06:15:25.959653 sshd[2675]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 06:15:25.961713 systemd[1]: sshd@129-139.178.90.101:22-218.92.0.76:60388.service: Deactivated successfully. Feb 13 06:15:25.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-218.92.0.76:60388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:15:26.054879 kernel: audit: type=1131 audit(1707804925.961:622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.90.101:22-218.92.0.76:60388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:16:11.139674 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:16:11.138Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":5205} Feb 13 06:16:11.155416 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:16:11.155Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":5205,"took":"15.585501ms"} Feb 13 06:18:50.089394 systemd[1]: Started sshd@130-139.178.90.101:22-14.46.116.243:38414.service. Feb 13 06:18:50.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-14.46.116.243:38414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:18:50.183195 kernel: audit: type=1130 audit(1707805130.088:623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-14.46.116.243:38414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:18:51.797170 sshd[2691]: Invalid user admin from 14.46.116.243 port 38414 Feb 13 06:18:51.803212 sshd[2691]: pam_faillock(sshd:auth): User unknown Feb 13 06:18:51.804352 sshd[2691]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:18:51.804441 sshd[2691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.46.116.243 Feb 13 06:18:51.805368 sshd[2691]: pam_faillock(sshd:auth): User unknown Feb 13 06:18:51.804000 audit[2691]: USER_AUTH pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=14.46.116.243 addr=14.46.116.243 terminal=ssh res=failed' Feb 13 06:18:51.898949 kernel: audit: type=1100 audit(1707805131.804:624): pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=14.46.116.243 addr=14.46.116.243 terminal=ssh res=failed' Feb 13 06:18:53.677345 sshd[2691]: Failed password for invalid user admin from 14.46.116.243 port 38414 ssh2 Feb 13 06:18:56.265199 sshd[2691]: Connection closed by invalid user admin 14.46.116.243 port 38414 [preauth] Feb 13 06:18:56.267685 systemd[1]: sshd@130-139.178.90.101:22-14.46.116.243:38414.service: Deactivated successfully. Feb 13 06:18:56.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-14.46.116.243:38414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:18:56.361073 kernel: audit: type=1131 audit(1707805136.267:625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.90.101:22-14.46.116.243:38414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:37.674848 systemd[1]: Started sshd@131-139.178.90.101:22-2.57.122.87:51504.service. Feb 13 06:19:37.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-2.57.122.87:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:37.768077 kernel: audit: type=1130 audit(1707805177.674:626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-2.57.122.87:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:38.431773 sshd[2695]: Invalid user hqping from 2.57.122.87 port 51504 Feb 13 06:19:38.619265 sshd[2695]: pam_faillock(sshd:auth): User unknown Feb 13 06:19:38.620229 sshd[2695]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:19:38.620312 sshd[2695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 06:19:38.621149 sshd[2695]: pam_faillock(sshd:auth): User unknown Feb 13 06:19:38.620000 audit[2695]: USER_AUTH pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:19:38.715088 kernel: audit: type=1100 audit(1707805178.620:627): pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:19:40.613360 sshd[2695]: Failed password for invalid user hqping from 2.57.122.87 port 51504 ssh2 Feb 13 06:19:41.449539 sshd[2695]: Connection closed by invalid user hqping 2.57.122.87 port 51504 [preauth] Feb 13 06:19:41.452087 systemd[1]: sshd@131-139.178.90.101:22-2.57.122.87:51504.service: Deactivated successfully. Feb 13 06:19:41.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-2.57.122.87:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:41.546070 kernel: audit: type=1131 audit(1707805181.451:628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.90.101:22-2.57.122.87:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:54.453952 systemd[1]: Started sshd@132-139.178.90.101:22-185.196.10.93:36548.service. Feb 13 06:19:54.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-185.196.10.93:36548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:54.546936 kernel: audit: type=1130 audit(1707805194.453:629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-185.196.10.93:36548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:19:55.495243 sshd[2700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.10.93 user=root Feb 13 06:19:55.494000 audit[2700]: USER_AUTH pid=2700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.196.10.93 addr=185.196.10.93 terminal=ssh res=failed' Feb 13 06:19:55.588065 kernel: audit: type=1100 audit(1707805195.494:630): pid=2700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.196.10.93 addr=185.196.10.93 terminal=ssh res=failed' Feb 13 06:19:57.487971 sshd[2700]: Failed password for root from 185.196.10.93 port 36548 ssh2 Feb 13 06:20:01.851000 audit[2700]: USER_AUTH pid=2700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.196.10.93 addr=185.196.10.93 terminal=ssh res=failed' Feb 13 06:20:01.944935 kernel: audit: type=1100 audit(1707805201.851:631): pid=2700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.196.10.93 addr=185.196.10.93 terminal=ssh res=failed' Feb 13 06:20:03.669237 sshd[2700]: Failed password for root from 185.196.10.93 port 36548 ssh2 Feb 13 06:20:08.216282 sshd[2700]: Failed password for root from 185.196.10.93 port 36548 ssh2 Feb 13 06:20:11.373438 sshd[2700]: Connection closed by authenticating user root 185.196.10.93 port 36548 [preauth] Feb 13 06:20:11.373962 sshd[2700]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.10.93 user=root Feb 13 06:20:11.375998 systemd[1]: sshd@132-139.178.90.101:22-185.196.10.93:36548.service: Deactivated successfully. Feb 13 06:20:11.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-185.196.10.93:36548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:20:11.468969 kernel: audit: type=1131 audit(1707805211.375:632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.90.101:22-185.196.10.93:36548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:21:11.144374 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:21:11.143Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":5743} Feb 13 06:21:11.158541 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:21:11.157Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":5743,"took":"13.724274ms"} Feb 13 06:24:12.375635 systemd[1]: Started sshd@133-139.178.90.101:22-218.92.0.113:21765.service. Feb 13 06:24:12.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-218.92.0.113:21765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:12.468071 kernel: audit: type=1130 audit(1707805452.374:633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-218.92.0.113:21765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:13.445924 sshd[2713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:13.445000 audit[2713]: USER_AUTH pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:13.537922 kernel: audit: type=1100 audit(1707805453.445:634): pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:15.192146 sshd[2713]: Failed password for root from 218.92.0.113 port 21765 ssh2 Feb 13 06:24:17.231000 audit[2713]: USER_AUTH pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:17.324075 kernel: audit: type=1100 audit(1707805457.231:635): pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:19.523336 sshd[2713]: Failed password for root from 218.92.0.113 port 21765 ssh2 Feb 13 06:24:20.604000 audit[2713]: USER_AUTH pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:20.697044 kernel: audit: type=1100 audit(1707805460.604:636): pid=2713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:22.642954 sshd[2713]: Failed password for root from 218.92.0.113 port 21765 ssh2 Feb 13 06:24:23.980605 sshd[2713]: Received disconnect from 218.92.0.113 port 21765:11: [preauth] Feb 13 06:24:23.980605 sshd[2713]: Disconnected from authenticating user root 218.92.0.113 port 21765 [preauth] Feb 13 06:24:23.981189 sshd[2713]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:23.983265 systemd[1]: sshd@133-139.178.90.101:22-218.92.0.113:21765.service: Deactivated successfully. Feb 13 06:24:23.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-218.92.0.113:21765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:24.077057 kernel: audit: type=1131 audit(1707805463.982:637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.90.101:22-218.92.0.113:21765 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:24.131815 systemd[1]: Started sshd@134-139.178.90.101:22-218.92.0.113:25490.service. Feb 13 06:24:24.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-218.92.0.113:25490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:24.224933 kernel: audit: type=1130 audit(1707805464.131:638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-218.92.0.113:25490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:25.871810 sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:25.871000 audit[2717]: USER_AUTH pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:25.963940 kernel: audit: type=1100 audit(1707805465.871:639): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:27.598307 sshd[2717]: Failed password for root from 218.92.0.113 port 25490 ssh2 Feb 13 06:24:29.239000 audit[2717]: ANOM_LOGIN_FAILURES pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:29.240392 sshd[2717]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:24:29.239000 audit[2717]: USER_AUTH pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:29.396132 kernel: audit: type=2100 audit(1707805469.239:640): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:29.396218 kernel: audit: type=1100 audit(1707805469.239:641): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:31.513730 sshd[2717]: Failed password for root from 218.92.0.113 port 25490 ssh2 Feb 13 06:24:32.607000 audit[2717]: USER_AUTH pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:32.699927 kernel: audit: type=1100 audit(1707805472.607:642): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:34.294210 sshd[2717]: Failed password for root from 218.92.0.113 port 25490 ssh2 Feb 13 06:24:35.974585 sshd[2717]: Received disconnect from 218.92.0.113 port 25490:11: [preauth] Feb 13 06:24:35.974585 sshd[2717]: Disconnected from authenticating user root 218.92.0.113 port 25490 [preauth] Feb 13 06:24:35.975128 sshd[2717]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:35.977184 systemd[1]: sshd@134-139.178.90.101:22-218.92.0.113:25490.service: Deactivated successfully. Feb 13 06:24:35.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-218.92.0.113:25490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:36.071068 kernel: audit: type=1131 audit(1707805475.976:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.90.101:22-218.92.0.113:25490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:36.243134 systemd[1]: Started sshd@135-139.178.90.101:22-218.92.0.113:35979.service. Feb 13 06:24:36.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-218.92.0.113:35979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:36.337067 kernel: audit: type=1130 audit(1707805476.242:644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-218.92.0.113:35979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:37.312614 sshd[2721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:37.311000 audit[2721]: USER_AUTH pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:37.406063 kernel: audit: type=1100 audit(1707805477.311:645): pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:39.018914 sshd[2721]: Failed password for root from 218.92.0.113 port 35979 ssh2 Feb 13 06:24:40.686000 audit[2721]: USER_AUTH pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:40.780069 kernel: audit: type=1100 audit(1707805480.686:646): pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:42.804857 sshd[2721]: Failed password for root from 218.92.0.113 port 35979 ssh2 Feb 13 06:24:44.060000 audit[2721]: USER_AUTH pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:44.153941 kernel: audit: type=1100 audit(1707805484.060:647): pid=2721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.113 addr=218.92.0.113 terminal=ssh res=failed' Feb 13 06:24:45.727822 sshd[2721]: Failed password for root from 218.92.0.113 port 35979 ssh2 Feb 13 06:24:47.437096 sshd[2721]: Received disconnect from 218.92.0.113 port 35979:11: [preauth] Feb 13 06:24:47.437096 sshd[2721]: Disconnected from authenticating user root 218.92.0.113 port 35979 [preauth] Feb 13 06:24:47.437632 sshd[2721]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113 user=root Feb 13 06:24:47.439710 systemd[1]: sshd@135-139.178.90.101:22-218.92.0.113:35979.service: Deactivated successfully. Feb 13 06:24:47.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-218.92.0.113:35979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:24:47.532966 kernel: audit: type=1131 audit(1707805487.439:648): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.90.101:22-218.92.0.113:35979 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:11.149399 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:26:11.148Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":6282} Feb 13 06:26:11.163730 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:26:11.163Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":6282,"took":"13.869243ms"} Feb 13 06:26:12.969657 systemd[1]: Started sshd@136-139.178.90.101:22-141.98.11.90:48024.service. Feb 13 06:26:12.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-141.98.11.90:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:13.063077 kernel: audit: type=1130 audit(1707805572.968:649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-141.98.11.90:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:14.322174 sshd[2732]: Invalid user teste from 141.98.11.90 port 48024 Feb 13 06:26:14.700985 sshd[2732]: pam_faillock(sshd:auth): User unknown Feb 13 06:26:14.702173 sshd[2732]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:26:14.702261 sshd[2732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.90 Feb 13 06:26:14.703267 sshd[2732]: pam_faillock(sshd:auth): User unknown Feb 13 06:26:14.702000 audit[2732]: USER_AUTH pid=2732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teste" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 06:26:14.797077 kernel: audit: type=1100 audit(1707805574.702:650): pid=2732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teste" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 06:26:16.058654 sshd[2732]: Failed password for invalid user teste from 141.98.11.90 port 48024 ssh2 Feb 13 06:26:16.882696 sshd[2732]: Connection closed by invalid user teste 141.98.11.90 port 48024 [preauth] Feb 13 06:26:16.885225 systemd[1]: sshd@136-139.178.90.101:22-141.98.11.90:48024.service: Deactivated successfully. Feb 13 06:26:16.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-141.98.11.90:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:16.977925 kernel: audit: type=1131 audit(1707805576.883:651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.90.101:22-141.98.11.90:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:42.695155 systemd[1]: Started sshd@137-139.178.90.101:22-61.177.172.136:49079.service. Feb 13 06:26:42.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-61.177.172.136:49079 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:26:42.788067 kernel: audit: type=1130 audit(1707805602.694:652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-61.177.172.136:49079 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:28:42.700146 sshd[2738]: Timeout before authentication for 61.177.172.136 port 49079 Feb 13 06:28:42.701609 systemd[1]: sshd@137-139.178.90.101:22-61.177.172.136:49079.service: Deactivated successfully. Feb 13 06:28:42.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-61.177.172.136:49079 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:28:42.796071 kernel: audit: type=1131 audit(1707805722.701:653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.90.101:22-61.177.172.136:49079 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:43.010255 systemd[1]: Started sshd@138-139.178.90.101:22-180.101.88.196:18147.service. Feb 13 06:29:43.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-180.101.88.196:18147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:43.104074 kernel: audit: type=1130 audit(1707805783.009:654): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-180.101.88.196:18147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:49.039221 systemd[1]: Started sshd@139-139.178.90.101:22-2.57.122.87:41914.service. Feb 13 06:29:49.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-2.57.122.87:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:49.132984 kernel: audit: type=1130 audit(1707805789.038:655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-2.57.122.87:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:49.784165 sshd[2750]: Invalid user hqping from 2.57.122.87 port 41914 Feb 13 06:29:49.972372 sshd[2750]: pam_faillock(sshd:auth): User unknown Feb 13 06:29:49.973463 sshd[2750]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:29:49.973556 sshd[2750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 06:29:49.974477 sshd[2750]: pam_faillock(sshd:auth): User unknown Feb 13 06:29:49.973000 audit[2750]: USER_AUTH pid=2750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:29:50.066933 kernel: audit: type=1100 audit(1707805789.973:656): pid=2750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:29:51.846160 sshd[2750]: Failed password for invalid user hqping from 2.57.122.87 port 41914 ssh2 Feb 13 06:29:52.796655 sshd[2750]: Connection closed by invalid user hqping 2.57.122.87 port 41914 [preauth] Feb 13 06:29:52.799140 systemd[1]: sshd@139-139.178.90.101:22-2.57.122.87:41914.service: Deactivated successfully. Feb 13 06:29:52.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-2.57.122.87:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:29:52.893079 kernel: audit: type=1131 audit(1707805792.798:657): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.90.101:22-2.57.122.87:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:32.031070 systemd[1]: Started sshd@140-139.178.90.101:22-218.92.0.24:14711.service. Feb 13 06:30:32.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-218.92.0.24:14711 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:32.125076 kernel: audit: type=1130 audit(1707805832.030:658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-218.92.0.24:14711 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:33.866156 sshd[2756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:30:33.865000 audit[2756]: USER_AUTH pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:33.959083 kernel: audit: type=1100 audit(1707805833.865:659): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:35.778269 sshd[2756]: Failed password for root from 218.92.0.24 port 14711 ssh2 Feb 13 06:30:37.241000 audit[2756]: USER_AUTH pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:37.335073 kernel: audit: type=1100 audit(1707805837.241:660): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:39.033862 sshd[2756]: Failed password for root from 218.92.0.24 port 14711 ssh2 Feb 13 06:30:40.616000 audit[2756]: USER_AUTH pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:40.710086 kernel: audit: type=1100 audit(1707805840.616:661): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:30:42.825113 sshd[2756]: Failed password for root from 218.92.0.24 port 14711 ssh2 Feb 13 06:30:43.993221 sshd[2756]: Received disconnect from 218.92.0.24 port 14711:11: [preauth] Feb 13 06:30:43.993221 sshd[2756]: Disconnected from authenticating user root 218.92.0.24 port 14711 [preauth] Feb 13 06:30:43.993740 sshd[2756]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:30:43.995681 systemd[1]: sshd@140-139.178.90.101:22-218.92.0.24:14711.service: Deactivated successfully. Feb 13 06:30:43.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-218.92.0.24:14711 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:44.088930 kernel: audit: type=1131 audit(1707805843.995:662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.90.101:22-218.92.0.24:14711 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:44.153153 systemd[1]: Started sshd@141-139.178.90.101:22-218.92.0.24:48114.service. Feb 13 06:30:44.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-218.92.0.24:48114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:44.245070 kernel: audit: type=1130 audit(1707805844.152:663): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-218.92.0.24:48114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:54.490044 systemd[1]: Started sshd@142-139.178.90.101:22-218.92.0.24:61373.service. Feb 13 06:30:54.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-218.92.0.24:61373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:30:54.583087 kernel: audit: type=1130 audit(1707805854.489:664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-218.92.0.24:61373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:04.835651 systemd[1]: Started sshd@143-139.178.90.101:22-218.92.0.24:16517.service. Feb 13 06:31:04.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-218.92.0.24:16517 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:04.928962 kernel: audit: type=1130 audit(1707805864.834:665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-218.92.0.24:16517 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:11.154833 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:31:11.154Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":6819} Feb 13 06:31:11.169400 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:31:11.168Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":6819,"took":"13.976622ms"} Feb 13 06:31:15.188175 systemd[1]: Started sshd@144-139.178.90.101:22-218.92.0.24:32770.service. Feb 13 06:31:15.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.90.101:22-218.92.0.24:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:15.280087 kernel: audit: type=1130 audit(1707805875.187:666): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.90.101:22-218.92.0.24:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:17.074123 sshd[2771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:31:17.072000 audit[2771]: USER_AUTH pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:17.165909 kernel: audit: type=1100 audit(1707805877.072:667): pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:19.026248 sshd[2771]: Failed password for root from 218.92.0.24 port 32770 ssh2 Feb 13 06:31:20.451000 audit[2771]: ANOM_LOGIN_FAILURES pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:20.453604 sshd[2771]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:31:20.451000 audit[2771]: USER_AUTH pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:20.609838 kernel: audit: type=2100 audit(1707805880.451:668): pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:20.609869 kernel: audit: type=1100 audit(1707805880.451:669): pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:22.150013 sshd[2771]: Failed password for root from 218.92.0.24 port 32770 ssh2 Feb 13 06:31:23.831000 audit[2771]: USER_AUTH pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:23.925061 kernel: audit: type=1100 audit(1707805883.831:670): pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:26.276907 sshd[2771]: Failed password for root from 218.92.0.24 port 32770 ssh2 Feb 13 06:31:27.211961 sshd[2771]: Received disconnect from 218.92.0.24 port 32770:11: [preauth] Feb 13 06:31:27.211961 sshd[2771]: Disconnected from authenticating user root 218.92.0.24 port 32770 [preauth] Feb 13 06:31:27.212481 sshd[2771]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:31:27.214613 systemd[1]: sshd@144-139.178.90.101:22-218.92.0.24:32770.service: Deactivated successfully. Feb 13 06:31:27.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.90.101:22-218.92.0.24:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:27.307957 kernel: audit: type=1131 audit(1707805887.213:671): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.90.101:22-218.92.0.24:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:27.354298 systemd[1]: Started sshd@145-139.178.90.101:22-218.92.0.24:14108.service. Feb 13 06:31:27.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.90.101:22-218.92.0.24:14108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:27.445958 kernel: audit: type=1130 audit(1707805887.352:672): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.90.101:22-218.92.0.24:14108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:29.174390 sshd[2776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:31:29.172000 audit[2776]: USER_AUTH pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:29.267085 kernel: audit: type=1100 audit(1707805889.172:673): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:31.106756 sshd[2776]: Failed password for root from 218.92.0.24 port 14108 ssh2 Feb 13 06:31:32.538000 audit[2776]: USER_AUTH pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:32.632073 kernel: audit: type=1100 audit(1707805892.538:674): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:34.216939 sshd[2776]: Failed password for root from 218.92.0.24 port 14108 ssh2 Feb 13 06:31:35.905000 audit[2776]: USER_AUTH pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:35.999077 kernel: audit: type=1100 audit(1707805895.905:675): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.24 addr=218.92.0.24 terminal=ssh res=failed' Feb 13 06:31:38.329729 sshd[2776]: Failed password for root from 218.92.0.24 port 14108 ssh2 Feb 13 06:31:39.271176 sshd[2776]: Received disconnect from 218.92.0.24 port 14108:11: [preauth] Feb 13 06:31:39.271176 sshd[2776]: Disconnected from authenticating user root 218.92.0.24 port 14108 [preauth] Feb 13 06:31:39.271673 sshd[2776]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.24 user=root Feb 13 06:31:39.273663 systemd[1]: sshd@145-139.178.90.101:22-218.92.0.24:14108.service: Deactivated successfully. Feb 13 06:31:39.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.90.101:22-218.92.0.24:14108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:39.365899 kernel: audit: type=1131 audit(1707805899.273:676): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.90.101:22-218.92.0.24:14108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:43.015431 sshd[2746]: Timeout before authentication for 180.101.88.196 port 18147 Feb 13 06:31:43.016836 systemd[1]: sshd@138-139.178.90.101:22-180.101.88.196:18147.service: Deactivated successfully. Feb 13 06:31:43.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-180.101.88.196:18147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:31:43.110984 kernel: audit: type=1131 audit(1707805903.016:677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.90.101:22-180.101.88.196:18147 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:32:44.160178 sshd[2761]: Timeout before authentication for 218.92.0.24 port 48114 Feb 13 06:32:44.161609 systemd[1]: sshd@141-139.178.90.101:22-218.92.0.24:48114.service: Deactivated successfully. Feb 13 06:32:44.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-218.92.0.24:48114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:32:44.254076 kernel: audit: type=1131 audit(1707805964.161:678): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.90.101:22-218.92.0.24:48114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:32:54.495346 sshd[2763]: Timeout before authentication for 218.92.0.24 port 61373 Feb 13 06:32:54.496998 systemd[1]: sshd@142-139.178.90.101:22-218.92.0.24:61373.service: Deactivated successfully. Feb 13 06:32:54.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-218.92.0.24:61373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:32:54.590062 kernel: audit: type=1131 audit(1707805974.496:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.90.101:22-218.92.0.24:61373 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:33:04.840931 sshd[2765]: Timeout before authentication for 218.92.0.24 port 16517 Feb 13 06:33:04.842387 systemd[1]: sshd@143-139.178.90.101:22-218.92.0.24:16517.service: Deactivated successfully. Feb 13 06:33:04.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-218.92.0.24:16517 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:33:04.934899 kernel: audit: type=1131 audit(1707805984.841:680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.90.101:22-218.92.0.24:16517 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:36:11.157962 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:36:11.157Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":7357} Feb 13 06:36:11.172830 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:36:11.172Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":7357,"took":"14.342436ms"} Feb 13 06:38:13.406519 systemd[1]: Started sshd@146-139.178.90.101:22-180.103.124.67:35900.service. Feb 13 06:38:13.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.90.101:22-180.103.124.67:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:38:13.499958 kernel: audit: type=1130 audit(1707806293.405:681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.90.101:22-180.103.124.67:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:38:14.864889 sshd[2796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:38:14.864000 audit[2796]: USER_AUTH pid=2796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:38:14.958062 kernel: audit: type=1100 audit(1707806294.864:682): pid=2796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:38:17.063252 sshd[2796]: Failed password for root from 180.103.124.67 port 35900 ssh2 Feb 13 06:38:18.210474 sshd[2796]: Received disconnect from 180.103.124.67 port 35900:11: Bye Bye [preauth] Feb 13 06:38:18.210474 sshd[2796]: Disconnected from authenticating user root 180.103.124.67 port 35900 [preauth] Feb 13 06:38:18.213009 systemd[1]: sshd@146-139.178.90.101:22-180.103.124.67:35900.service: Deactivated successfully. Feb 13 06:38:18.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.90.101:22-180.103.124.67:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:38:18.307075 kernel: audit: type=1131 audit(1707806298.212:683): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.90.101:22-180.103.124.67:35900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:39:16.266382 systemd[1]: Started sshd@147-139.178.90.101:22-180.103.124.67:45224.service. Feb 13 06:39:16.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.90.101:22-180.103.124.67:45224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:39:16.359072 kernel: audit: type=1130 audit(1707806356.264:684): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.90.101:22-180.103.124.67:45224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:39:17.143508 sshd[2804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:39:17.141000 audit[2804]: USER_AUTH pid=2804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:39:17.236059 kernel: audit: type=1100 audit(1707806357.141:685): pid=2804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:39:18.659062 sshd[2804]: Failed password for root from 180.103.124.67 port 45224 ssh2 Feb 13 06:39:18.895288 sshd[2804]: Received disconnect from 180.103.124.67 port 45224:11: Bye Bye [preauth] Feb 13 06:39:18.895288 sshd[2804]: Disconnected from authenticating user root 180.103.124.67 port 45224 [preauth] Feb 13 06:39:18.897786 systemd[1]: sshd@147-139.178.90.101:22-180.103.124.67:45224.service: Deactivated successfully. Feb 13 06:39:18.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.90.101:22-180.103.124.67:45224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:39:18.992079 kernel: audit: type=1131 audit(1707806358.896:686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.90.101:22-180.103.124.67:45224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:00.512426 systemd[1]: Started sshd@148-139.178.90.101:22-2.57.122.87:55190.service. Feb 13 06:40:00.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.90.101:22-2.57.122.87:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:00.604880 kernel: audit: type=1130 audit(1707806400.511:687): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.90.101:22-2.57.122.87:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:01.287912 sshd[2809]: Invalid user hqping from 2.57.122.87 port 55190 Feb 13 06:40:01.478125 sshd[2809]: pam_faillock(sshd:auth): User unknown Feb 13 06:40:01.479285 sshd[2809]: pam_unix(sshd:auth): check pass; user unknown Feb 13 06:40:01.479374 sshd[2809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 06:40:01.480312 sshd[2809]: pam_faillock(sshd:auth): User unknown Feb 13 06:40:01.479000 audit[2809]: USER_AUTH pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:40:01.574084 kernel: audit: type=1100 audit(1707806401.479:688): pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hqping" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 06:40:03.703084 sshd[2809]: Failed password for invalid user hqping from 2.57.122.87 port 55190 ssh2 Feb 13 06:40:04.310239 sshd[2809]: Connection closed by invalid user hqping 2.57.122.87 port 55190 [preauth] Feb 13 06:40:04.312705 systemd[1]: sshd@148-139.178.90.101:22-2.57.122.87:55190.service: Deactivated successfully. Feb 13 06:40:04.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.90.101:22-2.57.122.87:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:04.405940 kernel: audit: type=1131 audit(1707806404.312:689): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.90.101:22-2.57.122.87:55190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:10.645450 systemd[1]: Started sshd@149-139.178.90.101:22-180.103.124.67:54004.service. Feb 13 06:40:10.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.90.101:22-180.103.124.67:54004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:40:10.737931 kernel: audit: type=1130 audit(1707806410.644:690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.90.101:22-180.103.124.67:54004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:08.933103 systemd[1]: Started sshd@150-139.178.90.101:22-180.103.124.67:34542.service. Feb 13 06:41:08.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.90.101:22-180.103.124.67:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:09.025957 kernel: audit: type=1130 audit(1707806468.932:691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.90.101:22-180.103.124.67:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:10.526904 sshd[2816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:41:10.526000 audit[2816]: USER_AUTH pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:41:10.620059 kernel: audit: type=1100 audit(1707806470.526:692): pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:41:11.162376 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:41:11.161Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":7898} Feb 13 06:41:11.178221 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:41:11.177Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":7898,"took":"15.205904ms"} Feb 13 06:41:12.554430 sshd[2816]: Failed password for root from 180.103.124.67 port 34542 ssh2 Feb 13 06:41:13.874752 sshd[2816]: Received disconnect from 180.103.124.67 port 34542:11: Bye Bye [preauth] Feb 13 06:41:13.874752 sshd[2816]: Disconnected from authenticating user root 180.103.124.67 port 34542 [preauth] Feb 13 06:41:13.877226 systemd[1]: sshd@150-139.178.90.101:22-180.103.124.67:34542.service: Deactivated successfully. Feb 13 06:41:13.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.90.101:22-180.103.124.67:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:13.971067 kernel: audit: type=1131 audit(1707806473.876:693): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.90.101:22-180.103.124.67:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:42.942392 systemd[1]: Started sshd@151-139.178.90.101:22-43.156.7.94:41132.service. Feb 13 06:41:42.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.90.101:22-43.156.7.94:41132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:43.034881 kernel: audit: type=1130 audit(1707806502.941:694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.90.101:22-43.156.7.94:41132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:44.045546 sshd[2824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.7.94 user=root Feb 13 06:41:44.044000 audit[2824]: USER_AUTH pid=2824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.7.94 addr=43.156.7.94 terminal=ssh res=failed' Feb 13 06:41:44.138062 kernel: audit: type=1100 audit(1707806504.044:695): pid=2824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.7.94 addr=43.156.7.94 terminal=ssh res=failed' Feb 13 06:41:45.405654 sshd[2824]: Failed password for root from 43.156.7.94 port 41132 ssh2 Feb 13 06:41:45.842711 sshd[2824]: Received disconnect from 43.156.7.94 port 41132:11: Bye Bye [preauth] Feb 13 06:41:45.842711 sshd[2824]: Disconnected from authenticating user root 43.156.7.94 port 41132 [preauth] Feb 13 06:41:45.845187 systemd[1]: sshd@151-139.178.90.101:22-43.156.7.94:41132.service: Deactivated successfully. Feb 13 06:41:45.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.90.101:22-43.156.7.94:41132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:45.938981 kernel: audit: type=1131 audit(1707806505.844:696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.90.101:22-43.156.7.94:41132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:49.886395 systemd[1]: Started sshd@152-139.178.90.101:22-46.101.146.252:37560.service. Feb 13 06:41:49.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.90.101:22-46.101.146.252:37560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:49.978903 kernel: audit: type=1130 audit(1707806509.885:697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.90.101:22-46.101.146.252:37560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:50.781598 sshd[2828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.146.252 user=root Feb 13 06:41:50.781000 audit[2828]: USER_AUTH pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.146.252 addr=46.101.146.252 terminal=ssh res=failed' Feb 13 06:41:50.872897 kernel: audit: type=1100 audit(1707806510.781:698): pid=2828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.146.252 addr=46.101.146.252 terminal=ssh res=failed' Feb 13 06:41:52.297866 sshd[2828]: Failed password for root from 46.101.146.252 port 37560 ssh2 Feb 13 06:41:52.537115 sshd[2828]: Received disconnect from 46.101.146.252 port 37560:11: Bye Bye [preauth] Feb 13 06:41:52.537115 sshd[2828]: Disconnected from authenticating user root 46.101.146.252 port 37560 [preauth] Feb 13 06:41:52.539598 systemd[1]: sshd@152-139.178.90.101:22-46.101.146.252:37560.service: Deactivated successfully. Feb 13 06:41:52.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.90.101:22-46.101.146.252:37560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:41:52.633070 kernel: audit: type=1131 audit(1707806512.539:699): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.90.101:22-46.101.146.252:37560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:02.591867 systemd[1]: Started sshd@153-139.178.90.101:22-180.103.124.67:43318.service. Feb 13 06:42:02.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.90.101:22-180.103.124.67:43318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:02.686079 kernel: audit: type=1130 audit(1707806522.591:700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.90.101:22-180.103.124.67:43318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:04.217522 sshd[2833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:42:04.216000 audit[2833]: USER_AUTH pid=2833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:42:04.311062 kernel: audit: type=1100 audit(1707806524.216:701): pid=2833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:42:06.325090 sshd[2833]: Failed password for root from 180.103.124.67 port 43318 ssh2 Feb 13 06:42:07.574534 sshd[2833]: Received disconnect from 180.103.124.67 port 43318:11: Bye Bye [preauth] Feb 13 06:42:07.574534 sshd[2833]: Disconnected from authenticating user root 180.103.124.67 port 43318 [preauth] Feb 13 06:42:07.576974 systemd[1]: sshd@153-139.178.90.101:22-180.103.124.67:43318.service: Deactivated successfully. Feb 13 06:42:07.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.90.101:22-180.103.124.67:43318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:07.671075 kernel: audit: type=1131 audit(1707806527.575:702): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.90.101:22-180.103.124.67:43318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:10.650733 sshd[2813]: Timeout before authentication for 180.103.124.67 port 54004 Feb 13 06:42:10.652201 systemd[1]: sshd@149-139.178.90.101:22-180.103.124.67:54004.service: Deactivated successfully. Feb 13 06:42:10.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.90.101:22-180.103.124.67:54004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:42:10.744963 kernel: audit: type=1131 audit(1707806530.650:703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.90.101:22-180.103.124.67:54004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:00.316708 systemd[1]: Started sshd@154-139.178.90.101:22-180.103.124.67:52114.service. Feb 13 06:43:00.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.90.101:22-180.103.124.67:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:00.411036 kernel: audit: type=1130 audit(1707806580.315:704): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.90.101:22-180.103.124.67:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:23.378027 systemd[1]: Started sshd@155-139.178.90.101:22-141.98.11.11:45424.service. Feb 13 06:43:23.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.90.101:22-141.98.11.11:45424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:23.470880 kernel: audit: type=1130 audit(1707806603.377:705): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.90.101:22-141.98.11.11:45424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:24.953907 sshd[2842]: Invalid user anonymous from 141.98.11.11 port 45424 Feb 13 06:43:25.146897 sshd[2842]: Failed none for invalid user anonymous from 141.98.11.11 port 45424 ssh2 Feb 13 06:43:25.321721 sshd[2842]: Connection closed by invalid user anonymous 141.98.11.11 port 45424 [preauth] Feb 13 06:43:25.321000 audit[2842]: USER_ERR pid=2842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 06:43:25.324440 systemd[1]: sshd@155-139.178.90.101:22-141.98.11.11:45424.service: Deactivated successfully. Feb 13 06:43:25.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.90.101:22-141.98.11.11:45424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:25.504891 kernel: audit: type=1109 audit(1707806605.321:706): pid=2842 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 06:43:25.504924 kernel: audit: type=1131 audit(1707806605.324:707): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.90.101:22-141.98.11.11:45424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:53.469638 systemd[1]: Started sshd@156-139.178.90.101:22-180.103.124.67:60888.service. Feb 13 06:43:53.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.90.101:22-180.103.124.67:60888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:53.562996 kernel: audit: type=1130 audit(1707806633.468:708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.90.101:22-180.103.124.67:60888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:55.092055 sshd[2846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:43:55.091000 audit[2846]: USER_AUTH pid=2846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:43:55.185060 kernel: audit: type=1100 audit(1707806635.091:709): pid=2846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:43:57.771721 sshd[2846]: Failed password for root from 180.103.124.67 port 60888 ssh2 Feb 13 06:43:58.450174 sshd[2846]: Received disconnect from 180.103.124.67 port 60888:11: Bye Bye [preauth] Feb 13 06:43:58.450174 sshd[2846]: Disconnected from authenticating user root 180.103.124.67 port 60888 [preauth] Feb 13 06:43:58.452796 systemd[1]: sshd@156-139.178.90.101:22-180.103.124.67:60888.service: Deactivated successfully. Feb 13 06:43:58.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.90.101:22-180.103.124.67:60888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:43:58.547076 kernel: audit: type=1131 audit(1707806638.452:710): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.90.101:22-180.103.124.67:60888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:12.936624 systemd[1]: Started sshd@157-139.178.90.101:22-218.92.0.27:61083.service. Feb 13 06:44:12.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.90.101:22-218.92.0.27:61083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:13.030081 kernel: audit: type=1130 audit(1707806652.935:711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.90.101:22-218.92.0.27:61083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:13.949967 sshd[2850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:13.949000 audit[2850]: USER_AUTH pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:14.043064 kernel: audit: type=1100 audit(1707806653.949:712): pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:16.098362 sshd[2850]: Failed password for root from 218.92.0.27 port 61083 ssh2 Feb 13 06:44:17.317000 audit[2850]: USER_AUTH pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:17.412000 kernel: audit: type=1100 audit(1707806657.317:713): pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:19.350979 sshd[2850]: Failed password for root from 218.92.0.27 port 61083 ssh2 Feb 13 06:44:20.690000 audit[2850]: USER_AUTH pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:20.783955 kernel: audit: type=1100 audit(1707806660.690:714): pid=2850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:22.468008 sshd[2850]: Failed password for root from 218.92.0.27 port 61083 ssh2 Feb 13 06:44:24.060933 sshd[2850]: Received disconnect from 218.92.0.27 port 61083:11: [preauth] Feb 13 06:44:24.060933 sshd[2850]: Disconnected from authenticating user root 218.92.0.27 port 61083 [preauth] Feb 13 06:44:24.061361 sshd[2850]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:24.063480 systemd[1]: sshd@157-139.178.90.101:22-218.92.0.27:61083.service: Deactivated successfully. Feb 13 06:44:24.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.90.101:22-218.92.0.27:61083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:24.157085 kernel: audit: type=1131 audit(1707806664.063:715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.90.101:22-218.92.0.27:61083 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:24.248010 systemd[1]: Started sshd@158-139.178.90.101:22-218.92.0.27:60672.service. Feb 13 06:44:24.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.90.101:22-218.92.0.27:60672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:24.340953 kernel: audit: type=1130 audit(1707806664.247:716): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.90.101:22-218.92.0.27:60672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:25.755101 sshd[2855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:25.754000 audit[2855]: ANOM_LOGIN_FAILURES pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:25.755366 sshd[2855]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 06:44:25.754000 audit[2855]: USER_AUTH pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:25.910770 kernel: audit: type=2100 audit(1707806665.754:717): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:25.910806 kernel: audit: type=1100 audit(1707806665.754:718): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:27.883451 sshd[2855]: Failed password for root from 218.92.0.27 port 60672 ssh2 Feb 13 06:44:29.134000 audit[2855]: USER_AUTH pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:29.232880 kernel: audit: type=1100 audit(1707806669.134:719): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:31.147754 sshd[2855]: Failed password for root from 218.92.0.27 port 60672 ssh2 Feb 13 06:44:32.502000 audit[2855]: USER_AUTH pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:32.596068 kernel: audit: type=1100 audit(1707806672.502:720): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:34.259938 sshd[2855]: Failed password for root from 218.92.0.27 port 60672 ssh2 Feb 13 06:44:35.883408 sshd[2855]: Received disconnect from 218.92.0.27 port 60672:11: [preauth] Feb 13 06:44:35.883408 sshd[2855]: Disconnected from authenticating user root 218.92.0.27 port 60672 [preauth] Feb 13 06:44:35.883976 sshd[2855]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:35.885914 systemd[1]: sshd@158-139.178.90.101:22-218.92.0.27:60672.service: Deactivated successfully. Feb 13 06:44:35.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.90.101:22-218.92.0.27:60672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:35.980072 kernel: audit: type=1131 audit(1707806675.885:721): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.90.101:22-218.92.0.27:60672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:36.056638 systemd[1]: Started sshd@159-139.178.90.101:22-218.92.0.27:15356.service. Feb 13 06:44:36.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.90.101:22-218.92.0.27:15356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:36.150077 kernel: audit: type=1130 audit(1707806676.055:722): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.90.101:22-218.92.0.27:15356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:37.110866 sshd[2859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:37.110000 audit[2859]: USER_AUTH pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:37.203058 kernel: audit: type=1100 audit(1707806677.110:723): pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:39.890274 sshd[2859]: Failed password for root from 218.92.0.27 port 15356 ssh2 Feb 13 06:44:40.493000 audit[2859]: USER_AUTH pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:40.585923 kernel: audit: type=1100 audit(1707806680.493:724): pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:42.350683 sshd[2859]: Failed password for root from 218.92.0.27 port 15356 ssh2 Feb 13 06:44:43.860000 audit[2859]: USER_AUTH pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:43.954064 kernel: audit: type=1100 audit(1707806683.860:725): pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 06:44:46.129501 sshd[2859]: Failed password for root from 218.92.0.27 port 15356 ssh2 Feb 13 06:44:47.240613 sshd[2859]: Received disconnect from 218.92.0.27 port 15356:11: [preauth] Feb 13 06:44:47.240613 sshd[2859]: Disconnected from authenticating user root 218.92.0.27 port 15356 [preauth] Feb 13 06:44:47.241172 sshd[2859]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 06:44:47.243146 systemd[1]: sshd@159-139.178.90.101:22-218.92.0.27:15356.service: Deactivated successfully. Feb 13 06:44:47.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.90.101:22-218.92.0.27:15356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:47.335880 kernel: audit: type=1131 audit(1707806687.242:726): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.90.101:22-218.92.0.27:15356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:47.486985 systemd[1]: Started sshd@160-139.178.90.101:22-180.103.124.67:41440.service. Feb 13 06:44:47.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.90.101:22-180.103.124.67:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:47.581063 kernel: audit: type=1130 audit(1707806687.486:727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.90.101:22-180.103.124.67:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:48.333113 sshd[2863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:44:48.332000 audit[2863]: USER_AUTH pid=2863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:44:48.425880 kernel: audit: type=1100 audit(1707806688.332:728): pid=2863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:44:50.621407 sshd[2863]: Failed password for root from 180.103.124.67 port 41440 ssh2 Feb 13 06:44:51.683922 sshd[2863]: Received disconnect from 180.103.124.67 port 41440:11: Bye Bye [preauth] Feb 13 06:44:51.683922 sshd[2863]: Disconnected from authenticating user root 180.103.124.67 port 41440 [preauth] Feb 13 06:44:51.686367 systemd[1]: sshd@160-139.178.90.101:22-180.103.124.67:41440.service: Deactivated successfully. Feb 13 06:44:51.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.90.101:22-180.103.124.67:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:44:51.780066 kernel: audit: type=1131 audit(1707806691.685:729): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.90.101:22-180.103.124.67:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:00.322103 sshd[2839]: Timeout before authentication for 180.103.124.67 port 52114 Feb 13 06:45:00.323557 systemd[1]: sshd@154-139.178.90.101:22-180.103.124.67:52114.service: Deactivated successfully. Feb 13 06:45:00.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.90.101:22-180.103.124.67:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:00.417068 kernel: audit: type=1131 audit(1707806700.323:730): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.90.101:22-180.103.124.67:52114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:07.341374 systemd[1]: Started sshd@161-139.178.90.101:22-47.115.213.55:56254.service. Feb 13 06:45:07.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.90.101:22-47.115.213.55:56254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:07.435074 kernel: audit: type=1130 audit(1707806707.340:731): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.90.101:22-47.115.213.55:56254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:27.478048 systemd[1]: Started sshd@162-139.178.90.101:22-180.103.124.67:50228.service. Feb 13 06:45:27.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.90.101:22-180.103.124.67:50228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:27.572079 kernel: audit: type=1130 audit(1707806727.476:732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.90.101:22-180.103.124.67:50228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:28.372277 sshd[2871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:45:28.370000 audit[2871]: USER_AUTH pid=2871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:45:28.464941 kernel: audit: type=1100 audit(1707806728.370:733): pid=2871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:45:30.485222 sshd[2871]: Failed password for root from 180.103.124.67 port 50228 ssh2 Feb 13 06:45:31.734037 sshd[2871]: Received disconnect from 180.103.124.67 port 50228:11: Bye Bye [preauth] Feb 13 06:45:31.734037 sshd[2871]: Disconnected from authenticating user root 180.103.124.67 port 50228 [preauth] Feb 13 06:45:31.736475 systemd[1]: sshd@162-139.178.90.101:22-180.103.124.67:50228.service: Deactivated successfully. Feb 13 06:45:31.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.90.101:22-180.103.124.67:50228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:31.831077 kernel: audit: type=1131 audit(1707806731.736:734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.90.101:22-180.103.124.67:50228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:35.587871 systemd[1]: Started sshd@163-139.178.90.101:22-218.92.0.29:37165.service. Feb 13 06:45:35.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.90.101:22-218.92.0.29:37165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:35.680881 kernel: audit: type=1130 audit(1707806735.587:735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.90.101:22-218.92.0.29:37165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:36.547310 sshd[2875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:45:36.546000 audit[2875]: USER_AUTH pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:36.640064 kernel: audit: type=1100 audit(1707806736.546:736): pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:39.091704 sshd[2875]: Failed password for root from 218.92.0.29 port 37165 ssh2 Feb 13 06:45:39.902000 audit[2875]: USER_AUTH pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:39.994880 kernel: audit: type=1100 audit(1707806739.902:737): pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:41.524198 sshd[2875]: Failed password for root from 218.92.0.29 port 37165 ssh2 Feb 13 06:45:41.602588 systemd[1]: Started sshd@164-139.178.90.101:22-180.101.88.197:25777.service. Feb 13 06:45:41.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.90.101:22-180.101.88.197:25777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:41.695937 kernel: audit: type=1130 audit(1707806741.601:738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.90.101:22-180.101.88.197:25777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:42.669252 sshd[2879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:45:42.668000 audit[2879]: USER_AUTH pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:42.762061 kernel: audit: type=1100 audit(1707806742.668:739): pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:43.256000 audit[2875]: USER_AUTH pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:43.348940 kernel: audit: type=1100 audit(1707806743.256:740): pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:44.702095 sshd[2879]: Failed password for root from 180.101.88.197 port 25777 ssh2 Feb 13 06:45:45.430235 sshd[2875]: Failed password for root from 218.92.0.29 port 37165 ssh2 Feb 13 06:45:46.037000 audit[2879]: USER_AUTH pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:46.131065 kernel: audit: type=1100 audit(1707806746.037:741): pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:46.614602 sshd[2875]: Received disconnect from 218.92.0.29 port 37165:11: [preauth] Feb 13 06:45:46.614602 sshd[2875]: Disconnected from authenticating user root 218.92.0.29 port 37165 [preauth] Feb 13 06:45:46.615152 sshd[2875]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:45:46.617181 systemd[1]: sshd@163-139.178.90.101:22-218.92.0.29:37165.service: Deactivated successfully. Feb 13 06:45:46.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.90.101:22-218.92.0.29:37165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:46.710070 kernel: audit: type=1131 audit(1707806746.616:742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.90.101:22-218.92.0.29:37165 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:46.767165 systemd[1]: Started sshd@165-139.178.90.101:22-218.92.0.29:56184.service. Feb 13 06:45:46.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.90.101:22-218.92.0.29:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:46.860073 kernel: audit: type=1130 audit(1707806746.766:743): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.90.101:22-218.92.0.29:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:47.724859 sshd[2883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:45:47.724000 audit[2883]: USER_AUTH pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:47.817062 kernel: audit: type=1100 audit(1707806747.724:744): pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:47.955143 sshd[2879]: Failed password for root from 180.101.88.197 port 25777 ssh2 Feb 13 06:45:49.406000 audit[2879]: USER_AUTH pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:49.501071 kernel: audit: type=1100 audit(1707806749.406:745): pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:50.113486 sshd[2883]: Failed password for root from 218.92.0.29 port 56184 ssh2 Feb 13 06:45:51.080000 audit[2883]: USER_AUTH pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:51.174064 kernel: audit: type=1100 audit(1707806751.080:746): pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:51.735979 sshd[2879]: Failed password for root from 180.101.88.197 port 25777 ssh2 Feb 13 06:45:52.776286 sshd[2879]: Received disconnect from 180.101.88.197 port 25777:11: [preauth] Feb 13 06:45:52.776286 sshd[2879]: Disconnected from authenticating user root 180.101.88.197 port 25777 [preauth] Feb 13 06:45:52.776787 sshd[2879]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:45:52.778746 systemd[1]: sshd@164-139.178.90.101:22-180.101.88.197:25777.service: Deactivated successfully. Feb 13 06:45:52.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.90.101:22-180.101.88.197:25777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:52.873019 kernel: audit: type=1131 audit(1707806752.778:747): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.90.101:22-180.101.88.197:25777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:52.921570 systemd[1]: Started sshd@166-139.178.90.101:22-180.101.88.197:28772.service. Feb 13 06:45:52.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.90.101:22-180.101.88.197:28772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:53.013060 kernel: audit: type=1130 audit(1707806752.920:748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.90.101:22-180.101.88.197:28772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:53.349930 sshd[2883]: Failed password for root from 218.92.0.29 port 56184 ssh2 Feb 13 06:45:53.918624 sshd[2888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:45:53.918000 audit[2888]: USER_AUTH pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:54.012046 kernel: audit: type=1100 audit(1707806753.918:749): pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:54.437000 audit[2883]: USER_AUTH pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:54.529991 kernel: audit: type=1100 audit(1707806754.437:750): pid=2883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:55.795637 sshd[2888]: Failed password for root from 180.101.88.197 port 28772 ssh2 Feb 13 06:45:56.119355 sshd[2883]: Failed password for root from 218.92.0.29 port 56184 ssh2 Feb 13 06:45:57.280000 audit[2888]: USER_AUTH pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:57.374092 kernel: audit: type=1100 audit(1707806757.280:751): pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:45:57.793993 sshd[2883]: Received disconnect from 218.92.0.29 port 56184:11: [preauth] Feb 13 06:45:57.793993 sshd[2883]: Disconnected from authenticating user root 218.92.0.29 port 56184 [preauth] Feb 13 06:45:57.794574 sshd[2883]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:45:57.796542 systemd[1]: sshd@165-139.178.90.101:22-218.92.0.29:56184.service: Deactivated successfully. Feb 13 06:45:57.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.90.101:22-218.92.0.29:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:57.890074 kernel: audit: type=1131 audit(1707806757.796:752): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.90.101:22-218.92.0.29:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:57.931282 systemd[1]: Started sshd@167-139.178.90.101:22-218.92.0.29:18572.service. Feb 13 06:45:57.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.90.101:22-218.92.0.29:18572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:58.023880 kernel: audit: type=1130 audit(1707806757.930:753): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.90.101:22-218.92.0.29:18572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:45:59.268320 sshd[2892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:45:59.267000 audit[2892]: USER_AUTH pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:59.359879 kernel: audit: type=1100 audit(1707806759.267:754): pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:45:59.374156 sshd[2888]: Failed password for root from 180.101.88.197 port 28772 ssh2 Feb 13 06:46:00.644000 audit[2888]: USER_AUTH pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:00.737933 kernel: audit: type=1100 audit(1707806760.644:755): pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:01.637264 sshd[2892]: Failed password for root from 218.92.0.29 port 18572 ssh2 Feb 13 06:46:02.620000 audit[2892]: USER_AUTH pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:46:02.712936 kernel: audit: type=1100 audit(1707806762.620:756): pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:46:03.149508 sshd[2888]: Failed password for root from 180.101.88.197 port 28772 ssh2 Feb 13 06:46:03.947781 systemd[1]: Started sshd@168-139.178.90.101:22-180.103.124.67:59022.service. Feb 13 06:46:03.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.90.101:22-180.103.124.67:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.007154 sshd[2888]: Received disconnect from 180.101.88.197 port 28772:11: [preauth] Feb 13 06:46:04.007154 sshd[2888]: Disconnected from authenticating user root 180.101.88.197 port 28772 [preauth] Feb 13 06:46:04.007278 sshd[2888]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:46:04.007748 systemd[1]: sshd@166-139.178.90.101:22-180.101.88.197:28772.service: Deactivated successfully. Feb 13 06:46:04.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.90.101:22-180.101.88.197:28772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.132179 kernel: audit: type=1130 audit(1707806763.946:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.90.101:22-180.103.124.67:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.132217 kernel: audit: type=1131 audit(1707806764.006:758): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.90.101:22-180.101.88.197:28772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.151366 systemd[1]: Started sshd@169-139.178.90.101:22-180.101.88.197:34141.service. Feb 13 06:46:04.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.90.101:22-180.101.88.197:34141 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.243077 kernel: audit: type=1130 audit(1707806764.150:759): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.90.101:22-180.101.88.197:34141 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:04.733847 sshd[2892]: Failed password for root from 218.92.0.29 port 18572 ssh2 Feb 13 06:46:04.791608 sshd[2895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:46:04.791000 audit[2895]: USER_AUTH pid=2895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:46:04.882880 kernel: audit: type=1100 audit(1707806764.791:760): pid=2895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:46:05.122368 sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:46:05.121000 audit[2899]: USER_AUTH pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:05.221891 kernel: audit: type=1100 audit(1707806765.121:761): pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:05.596217 systemd[1]: Started sshd@170-139.178.90.101:22-218.92.0.22:34251.service. Feb 13 06:46:05.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.90.101:22-218.92.0.22:34251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:05.689071 kernel: audit: type=1130 audit(1707806765.595:762): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.90.101:22-218.92.0.22:34251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:05.973000 audit[2892]: USER_AUTH pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:46:06.073077 kernel: audit: type=1100 audit(1707806765.973:763): pid=2892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 13 06:46:06.647930 sshd[2899]: Failed password for root from 180.101.88.197 port 34141 ssh2 Feb 13 06:46:06.703783 sshd[2903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:06.703000 audit[2903]: USER_AUTH pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:06.795983 kernel: audit: type=1100 audit(1707806766.703:764): pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:06.844581 sshd[2895]: Failed password for root from 180.103.124.67 port 59022 ssh2 Feb 13 06:46:06.879000 audit[2899]: USER_AUTH pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:06.978879 kernel: audit: type=1100 audit(1707806766.879:765): pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:07.499615 sshd[2892]: Failed password for root from 218.92.0.29 port 18572 ssh2 Feb 13 06:46:07.720479 sshd[2892]: Received disconnect from 218.92.0.29 port 18572:11: [preauth] Feb 13 06:46:07.720479 sshd[2892]: Disconnected from authenticating user root 218.92.0.29 port 18572 [preauth] Feb 13 06:46:07.721016 sshd[2892]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 13 06:46:07.723044 systemd[1]: sshd@167-139.178.90.101:22-218.92.0.29:18572.service: Deactivated successfully. Feb 13 06:46:07.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.90.101:22-218.92.0.29:18572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:07.817079 kernel: audit: type=1131 audit(1707806767.722:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.90.101:22-218.92.0.29:18572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:08.149231 sshd[2895]: Received disconnect from 180.103.124.67 port 59022:11: Bye Bye [preauth] Feb 13 06:46:08.149231 sshd[2895]: Disconnected from authenticating user root 180.103.124.67 port 59022 [preauth] Feb 13 06:46:08.151711 systemd[1]: sshd@168-139.178.90.101:22-180.103.124.67:59022.service: Deactivated successfully. Feb 13 06:46:08.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.90.101:22-180.103.124.67:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:08.701246 sshd[2903]: Failed password for root from 218.92.0.22 port 34251 ssh2 Feb 13 06:46:08.877821 sshd[2899]: Failed password for root from 180.101.88.197 port 34141 ssh2 Feb 13 06:46:10.090000 audit[2903]: USER_AUTH pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:10.119033 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 06:46:10.119064 kernel: audit: type=1100 audit(1707806770.090:768): pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:10.239000 audit[2899]: USER_AUTH pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:10.331912 kernel: audit: type=1100 audit(1707806770.239:769): pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 06:46:11.167662 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:46:11.166Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":8547} Feb 13 06:46:11.185135 etcd-wrapper[1729]: {"level":"info","ts":"2024-02-13T06:46:11.184Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":8547,"took":"16.915864ms"} Feb 13 06:46:11.968259 sshd[2903]: Failed password for root from 218.92.0.22 port 34251 ssh2 Feb 13 06:46:12.117694 sshd[2899]: Failed password for root from 180.101.88.197 port 34141 ssh2 Feb 13 06:46:13.464000 audit[2903]: USER_AUTH pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:13.557052 kernel: audit: type=1100 audit(1707806773.464:770): pid=2903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:13.599638 sshd[2899]: Received disconnect from 180.101.88.197 port 34141:11: [preauth] Feb 13 06:46:13.599638 sshd[2899]: Disconnected from authenticating user root 180.101.88.197 port 34141 [preauth] Feb 13 06:46:13.599781 sshd[2899]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 06:46:13.600321 systemd[1]: sshd@169-139.178.90.101:22-180.101.88.197:34141.service: Deactivated successfully. Feb 13 06:46:13.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.90.101:22-180.101.88.197:34141 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:13.693086 kernel: audit: type=1131 audit(1707806773.599:771): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.90.101:22-180.101.88.197:34141 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:15.754084 sshd[2903]: Failed password for root from 218.92.0.22 port 34251 ssh2 Feb 13 06:46:16.839007 sshd[2903]: Received disconnect from 218.92.0.22 port 34251:11: [preauth] Feb 13 06:46:16.839007 sshd[2903]: Disconnected from authenticating user root 218.92.0.22 port 34251 [preauth] Feb 13 06:46:16.839542 sshd[2903]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:16.841924 systemd[1]: sshd@170-139.178.90.101:22-218.92.0.22:34251.service: Deactivated successfully. Feb 13 06:46:16.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.90.101:22-218.92.0.22:34251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:16.933951 kernel: audit: type=1131 audit(1707806776.841:772): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.90.101:22-218.92.0.22:34251 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:16.990244 systemd[1]: Started sshd@171-139.178.90.101:22-218.92.0.22:39658.service. Feb 13 06:46:16.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.90.101:22-218.92.0.22:39658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:17.082072 kernel: audit: type=1130 audit(1707806776.989:773): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.90.101:22-218.92.0.22:39658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:18.017506 sshd[2912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:18.016000 audit[2912]: USER_AUTH pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:18.109060 kernel: audit: type=1100 audit(1707806778.016:774): pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:19.994809 sshd[2912]: Failed password for root from 218.92.0.22 port 39658 ssh2 Feb 13 06:46:21.384000 audit[2912]: USER_AUTH pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:21.477064 kernel: audit: type=1100 audit(1707806781.384:775): pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:23.774289 sshd[2912]: Failed password for root from 218.92.0.22 port 39658 ssh2 Feb 13 06:46:24.752000 audit[2912]: USER_AUTH pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:24.845053 kernel: audit: type=1100 audit(1707806784.752:776): pid=2912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:26.886076 sshd[2912]: Failed password for root from 218.92.0.22 port 39658 ssh2 Feb 13 06:46:28.131560 sshd[2912]: Received disconnect from 218.92.0.22 port 39658:11: [preauth] Feb 13 06:46:28.131560 sshd[2912]: Disconnected from authenticating user root 218.92.0.22 port 39658 [preauth] Feb 13 06:46:28.132077 sshd[2912]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:28.134066 systemd[1]: sshd@171-139.178.90.101:22-218.92.0.22:39658.service: Deactivated successfully. Feb 13 06:46:28.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.90.101:22-218.92.0.22:39658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:28.227081 kernel: audit: type=1131 audit(1707806788.133:777): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.90.101:22-218.92.0.22:39658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:28.295414 systemd[1]: Started sshd@172-139.178.90.101:22-218.92.0.22:48481.service. Feb 13 06:46:28.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.90.101:22-218.92.0.22:48481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:28.386881 kernel: audit: type=1130 audit(1707806788.294:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.90.101:22-218.92.0.22:48481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:29.334270 sshd[2921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:29.333000 audit[2921]: USER_AUTH pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:29.426060 kernel: audit: type=1100 audit(1707806789.333:779): pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:30.819258 sshd[2921]: Failed password for root from 218.92.0.22 port 48481 ssh2 Feb 13 06:46:31.108000 audit[2921]: USER_AUTH pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:31.201058 kernel: audit: type=1100 audit(1707806791.108:780): pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:32.870150 sshd[2921]: Failed password for root from 218.92.0.22 port 48481 ssh2 Feb 13 06:46:34.481000 audit[2921]: USER_AUTH pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:34.573063 kernel: audit: type=1100 audit(1707806794.481:781): pid=2921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.22 addr=218.92.0.22 terminal=ssh res=failed' Feb 13 06:46:36.654157 sshd[2921]: Failed password for root from 218.92.0.22 port 48481 ssh2 Feb 13 06:46:37.851492 sshd[2921]: Received disconnect from 218.92.0.22 port 48481:11: [preauth] Feb 13 06:46:37.851492 sshd[2921]: Disconnected from authenticating user root 218.92.0.22 port 48481 [preauth] Feb 13 06:46:37.852018 sshd[2921]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.22 user=root Feb 13 06:46:37.854033 systemd[1]: sshd@172-139.178.90.101:22-218.92.0.22:48481.service: Deactivated successfully. Feb 13 06:46:37.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.90.101:22-218.92.0.22:48481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:37.944930 kernel: audit: type=1131 audit(1707806797.853:782): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.90.101:22-218.92.0.22:48481 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:40.797276 systemd[1]: Started sshd@173-139.178.90.101:22-180.103.124.67:39582.service. Feb 13 06:46:40.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.90.101:22-180.103.124.67:39582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:40.889881 kernel: audit: type=1130 audit(1707806800.796:783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.90.101:22-180.103.124.67:39582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:41.625298 sshd[2925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:46:41.624000 audit[2925]: USER_AUTH pid=2925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:46:41.718039 kernel: audit: type=1100 audit(1707806801.624:784): pid=2925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:46:43.426946 sshd[2925]: Failed password for root from 180.103.124.67 port 39582 ssh2 Feb 13 06:46:44.973396 sshd[2925]: Received disconnect from 180.103.124.67 port 39582:11: Bye Bye [preauth] Feb 13 06:46:44.973396 sshd[2925]: Disconnected from authenticating user root 180.103.124.67 port 39582 [preauth] Feb 13 06:46:44.975904 systemd[1]: sshd@173-139.178.90.101:22-180.103.124.67:39582.service: Deactivated successfully. Feb 13 06:46:44.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.90.101:22-180.103.124.67:39582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:46:45.070186 kernel: audit: type=1131 audit(1707806804.975:785): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.90.101:22-180.103.124.67:39582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:07.346499 sshd[2868]: Timeout before authentication for 47.115.213.55 port 56254 Feb 13 06:47:07.347867 systemd[1]: sshd@161-139.178.90.101:22-47.115.213.55:56254.service: Deactivated successfully. Feb 13 06:47:07.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.90.101:22-47.115.213.55:56254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:07.441064 kernel: audit: type=1131 audit(1707806827.347:786): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.90.101:22-47.115.213.55:56254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:14.234745 systemd[1]: Started sshd@174-139.178.90.101:22-180.103.124.67:48380.service. Feb 13 06:47:14.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.90.101:22-180.103.124.67:48380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:14.328073 kernel: audit: type=1130 audit(1707806834.233:787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.90.101:22-180.103.124.67:48380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:15.077658 sshd[2933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.103.124.67 user=root Feb 13 06:47:15.077000 audit[2933]: USER_AUTH pid=2933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:47:15.169916 kernel: audit: type=1100 audit(1707806835.077:788): pid=2933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.103.124.67 addr=180.103.124.67 terminal=ssh res=failed' Feb 13 06:47:16.879435 sshd[2933]: Failed password for root from 180.103.124.67 port 48380 ssh2 Feb 13 06:47:18.428924 sshd[2933]: Received disconnect from 180.103.124.67 port 48380:11: Bye Bye [preauth] Feb 13 06:47:18.428924 sshd[2933]: Disconnected from authenticating user root 180.103.124.67 port 48380 [preauth] Feb 13 06:47:18.431555 systemd[1]: sshd@174-139.178.90.101:22-180.103.124.67:48380.service: Deactivated successfully. Feb 13 06:47:18.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.90.101:22-180.103.124.67:48380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 06:47:18.525080 kernel: audit: type=1131 audit(1707806838.431:789): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.90.101:22-180.103.124.67:48380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'