Jan 16 21:06:56.975918 kernel: Linux version 6.12.65-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 14.3.1_p20250801 p4) 14.3.1 20250801, GNU ld (Gentoo 2.45 p3) 2.45.0) #1 SMP PREEMPT_DYNAMIC Fri Jan 16 18:44:02 -00 2026 Jan 16 21:06:56.976049 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=e880b5400e832e1de59b993d9ba6b86a9089175f10b4985da8b7b47cc8c74099 Jan 16 21:06:56.976070 kernel: BIOS-provided physical RAM map: Jan 16 21:06:56.976081 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 16 21:06:56.976091 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 16 21:06:56.976102 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 16 21:06:56.976116 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Jan 16 21:06:56.976133 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Jan 16 21:06:56.976145 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 16 21:06:56.976156 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 16 21:06:56.976169 kernel: NX (Execute Disable) protection: active Jan 16 21:06:56.976184 kernel: APIC: Static calls initialized Jan 16 21:06:56.976196 kernel: SMBIOS 2.8 present. Jan 16 21:06:56.976208 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Jan 16 21:06:56.976223 kernel: DMI: Memory slots populated: 1/1 Jan 16 21:06:56.976237 kernel: Hypervisor detected: KVM Jan 16 21:06:56.976257 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Jan 16 21:06:56.976270 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 16 21:06:56.976284 kernel: kvm-clock: using sched offset of 4076272062 cycles Jan 16 21:06:56.976305 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 16 21:06:56.976320 kernel: tsc: Detected 2494.136 MHz processor Jan 16 21:06:56.976334 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 16 21:06:56.976349 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 16 21:06:56.976366 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Jan 16 21:06:56.976382 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Jan 16 21:06:56.976396 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 16 21:06:56.976411 kernel: ACPI: Early table checksum verification disabled Jan 16 21:06:56.976425 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Jan 16 21:06:56.976440 kernel: ACPI: RSDT 0x000000007FFE19FD 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976454 kernel: ACPI: FACP 0x000000007FFE17E1 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976469 kernel: ACPI: DSDT 0x000000007FFE0040 0017A1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976486 kernel: ACPI: FACS 0x000000007FFE0000 000040 Jan 16 21:06:56.976498 kernel: ACPI: APIC 0x000000007FFE1855 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976511 kernel: ACPI: HPET 0x000000007FFE18D5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976523 kernel: ACPI: SRAT 0x000000007FFE190D 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976535 kernel: ACPI: WAET 0x000000007FFE19D5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 16 21:06:56.976548 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe17e1-0x7ffe1854] Jan 16 21:06:56.976560 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe17e0] Jan 16 21:06:56.976576 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Jan 16 21:06:56.976589 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe1855-0x7ffe18d4] Jan 16 21:06:56.976606 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe18d5-0x7ffe190c] Jan 16 21:06:56.976618 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe190d-0x7ffe19d4] Jan 16 21:06:56.976631 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe19d5-0x7ffe19fc] Jan 16 21:06:56.976648 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jan 16 21:06:56.976662 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jan 16 21:06:56.976675 kernel: NUMA: Node 0 [mem 0x00001000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00001000-0x7ffdafff] Jan 16 21:06:56.976688 kernel: NODE_DATA(0) allocated [mem 0x7ffd3dc0-0x7ffdafff] Jan 16 21:06:56.976716 kernel: Zone ranges: Jan 16 21:06:56.976728 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 16 21:06:56.976745 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Jan 16 21:06:56.976759 kernel: Normal empty Jan 16 21:06:56.976771 kernel: Device empty Jan 16 21:06:56.976785 kernel: Movable zone start for each node Jan 16 21:06:56.976798 kernel: Early memory node ranges Jan 16 21:06:56.976811 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 16 21:06:56.976824 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Jan 16 21:06:56.976837 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Jan 16 21:06:56.976855 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 16 21:06:56.976868 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 16 21:06:56.976880 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Jan 16 21:06:56.976899 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 16 21:06:56.976912 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 16 21:06:56.976927 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 16 21:06:56.976941 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 16 21:06:56.979025 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 16 21:06:56.979046 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 16 21:06:56.979066 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 16 21:06:56.979082 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 16 21:06:56.979098 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 16 21:06:56.979114 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 16 21:06:56.979131 kernel: TSC deadline timer available Jan 16 21:06:56.979153 kernel: CPU topo: Max. logical packages: 1 Jan 16 21:06:56.979166 kernel: CPU topo: Max. logical dies: 1 Jan 16 21:06:56.979182 kernel: CPU topo: Max. dies per package: 1 Jan 16 21:06:56.979198 kernel: CPU topo: Max. threads per core: 1 Jan 16 21:06:56.979214 kernel: CPU topo: Num. cores per package: 2 Jan 16 21:06:56.979230 kernel: CPU topo: Num. threads per package: 2 Jan 16 21:06:56.979245 kernel: CPU topo: Allowing 2 present CPUs plus 0 hotplug CPUs Jan 16 21:06:56.979261 kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Jan 16 21:06:56.979280 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Jan 16 21:06:56.979296 kernel: Booting paravirtualized kernel on KVM Jan 16 21:06:56.979312 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 16 21:06:56.979329 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 Jan 16 21:06:56.979345 kernel: percpu: Embedded 60 pages/cpu s207832 r8192 d29736 u1048576 Jan 16 21:06:56.979360 kernel: pcpu-alloc: s207832 r8192 d29736 u1048576 alloc=1*2097152 Jan 16 21:06:56.979376 kernel: pcpu-alloc: [0] 0 1 Jan 16 21:06:56.979394 kernel: kvm-guest: PV spinlocks disabled, no host support Jan 16 21:06:56.979412 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=e880b5400e832e1de59b993d9ba6b86a9089175f10b4985da8b7b47cc8c74099 Jan 16 21:06:56.979429 kernel: random: crng init done Jan 16 21:06:56.979444 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 16 21:06:56.979460 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 16 21:06:56.979475 kernel: Fallback order for Node 0: 0 Jan 16 21:06:56.979494 kernel: Built 1 zonelists, mobility grouping on. Total pages: 524153 Jan 16 21:06:56.979510 kernel: Policy zone: DMA32 Jan 16 21:06:56.979525 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 16 21:06:56.979541 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jan 16 21:06:56.979557 kernel: Kernel/User page tables isolation: enabled Jan 16 21:06:56.979573 kernel: ftrace: allocating 40128 entries in 157 pages Jan 16 21:06:56.979588 kernel: ftrace: allocated 157 pages with 5 groups Jan 16 21:06:56.979604 kernel: Dynamic Preempt: voluntary Jan 16 21:06:56.979623 kernel: rcu: Preemptible hierarchical RCU implementation. Jan 16 21:06:56.979640 kernel: rcu: RCU event tracing is enabled. Jan 16 21:06:56.979656 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jan 16 21:06:56.979672 kernel: Trampoline variant of Tasks RCU enabled. Jan 16 21:06:56.979687 kernel: Rude variant of Tasks RCU enabled. Jan 16 21:06:56.979703 kernel: Tracing variant of Tasks RCU enabled. Jan 16 21:06:56.979717 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 16 21:06:56.979733 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jan 16 21:06:56.979753 kernel: RCU Tasks: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 16 21:06:56.979772 kernel: RCU Tasks Rude: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 16 21:06:56.979788 kernel: RCU Tasks Trace: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 16 21:06:56.979803 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jan 16 21:06:56.979817 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 16 21:06:56.979833 kernel: Console: colour VGA+ 80x25 Jan 16 21:06:56.979848 kernel: printk: legacy console [tty0] enabled Jan 16 21:06:56.979868 kernel: printk: legacy console [ttyS0] enabled Jan 16 21:06:56.979884 kernel: ACPI: Core revision 20240827 Jan 16 21:06:56.979900 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 16 21:06:56.979928 kernel: APIC: Switch to symmetric I/O mode setup Jan 16 21:06:56.980466 kernel: x2apic enabled Jan 16 21:06:56.980495 kernel: APIC: Switched APIC routing to: physical x2apic Jan 16 21:06:56.980512 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 16 21:06:56.980530 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39654230, max_idle_ns: 440795207432 ns Jan 16 21:06:56.980551 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494136) Jan 16 21:06:56.980574 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jan 16 21:06:56.980591 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jan 16 21:06:56.980608 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 16 21:06:56.980625 kernel: Spectre V2 : Mitigation: Retpolines Jan 16 21:06:56.980645 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jan 16 21:06:56.980662 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Jan 16 21:06:56.980679 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 16 21:06:56.980708 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 16 21:06:56.980726 kernel: MDS: Mitigation: Clear CPU buffers Jan 16 21:06:56.980743 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jan 16 21:06:56.980760 kernel: active return thunk: its_return_thunk Jan 16 21:06:56.980780 kernel: ITS: Mitigation: Aligned branch/return thunks Jan 16 21:06:56.980797 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 16 21:06:56.980812 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 16 21:06:56.980828 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 16 21:06:56.980844 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 16 21:06:56.980861 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jan 16 21:06:56.980878 kernel: Freeing SMP alternatives memory: 32K Jan 16 21:06:56.980899 kernel: pid_max: default: 32768 minimum: 301 Jan 16 21:06:56.980916 kernel: LSM: initializing lsm=lockdown,capability,landlock,selinux,ima Jan 16 21:06:56.980933 kernel: landlock: Up and running. Jan 16 21:06:56.980971 kernel: SELinux: Initializing. Jan 16 21:06:56.980988 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jan 16 21:06:56.981006 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jan 16 21:06:56.981023 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Jan 16 21:06:56.981044 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Jan 16 21:06:56.981061 kernel: signal: max sigframe size: 1776 Jan 16 21:06:56.981078 kernel: rcu: Hierarchical SRCU implementation. Jan 16 21:06:56.981096 kernel: rcu: Max phase no-delay instances is 400. Jan 16 21:06:56.981113 kernel: Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level Jan 16 21:06:56.981130 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 16 21:06:56.981147 kernel: smp: Bringing up secondary CPUs ... Jan 16 21:06:56.981172 kernel: smpboot: x86: Booting SMP configuration: Jan 16 21:06:56.981189 kernel: .... node #0, CPUs: #1 Jan 16 21:06:56.981206 kernel: smp: Brought up 1 node, 2 CPUs Jan 16 21:06:56.981223 kernel: smpboot: Total of 2 processors activated (9976.54 BogoMIPS) Jan 16 21:06:56.981240 kernel: Memory: 1983292K/2096612K available (14336K kernel code, 2445K rwdata, 31644K rodata, 15536K init, 2500K bss, 108756K reserved, 0K cma-reserved) Jan 16 21:06:56.981257 kernel: devtmpfs: initialized Jan 16 21:06:56.981275 kernel: x86/mm: Memory block size: 128MB Jan 16 21:06:56.981296 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 16 21:06:56.981312 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jan 16 21:06:56.981329 kernel: pinctrl core: initialized pinctrl subsystem Jan 16 21:06:56.981346 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 16 21:06:56.981363 kernel: audit: initializing netlink subsys (disabled) Jan 16 21:06:56.981379 kernel: audit: type=2000 audit(1768597613.545:1): state=initialized audit_enabled=0 res=1 Jan 16 21:06:56.981396 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 16 21:06:56.981416 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 16 21:06:56.981433 kernel: cpuidle: using governor menu Jan 16 21:06:56.981450 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 16 21:06:56.981467 kernel: dca service started, version 1.12.1 Jan 16 21:06:56.981483 kernel: PCI: Using configuration type 1 for base access Jan 16 21:06:56.981500 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 16 21:06:56.981516 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jan 16 21:06:56.981537 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jan 16 21:06:56.981553 kernel: ACPI: Added _OSI(Module Device) Jan 16 21:06:56.981570 kernel: ACPI: Added _OSI(Processor Device) Jan 16 21:06:56.981587 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 16 21:06:56.981604 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 16 21:06:56.981620 kernel: ACPI: Interpreter enabled Jan 16 21:06:56.981637 kernel: ACPI: PM: (supports S0 S5) Jan 16 21:06:56.981653 kernel: ACPI: Using IOAPIC for interrupt routing Jan 16 21:06:56.981674 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 16 21:06:56.981690 kernel: PCI: Using E820 reservations for host bridge windows Jan 16 21:06:56.981707 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 16 21:06:56.981723 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 16 21:06:56.982069 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jan 16 21:06:56.982274 kernel: acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] Jan 16 21:06:56.982474 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended configuration space under this bridge Jan 16 21:06:56.982495 kernel: acpiphp: Slot [3] registered Jan 16 21:06:56.982512 kernel: acpiphp: Slot [4] registered Jan 16 21:06:56.982529 kernel: acpiphp: Slot [5] registered Jan 16 21:06:56.982545 kernel: acpiphp: Slot [6] registered Jan 16 21:06:56.982562 kernel: acpiphp: Slot [7] registered Jan 16 21:06:56.982583 kernel: acpiphp: Slot [8] registered Jan 16 21:06:56.982600 kernel: acpiphp: Slot [9] registered Jan 16 21:06:56.982617 kernel: acpiphp: Slot [10] registered Jan 16 21:06:56.982633 kernel: acpiphp: Slot [11] registered Jan 16 21:06:56.982650 kernel: acpiphp: Slot [12] registered Jan 16 21:06:56.982667 kernel: acpiphp: Slot [13] registered Jan 16 21:06:56.982684 kernel: acpiphp: Slot [14] registered Jan 16 21:06:56.982700 kernel: acpiphp: Slot [15] registered Jan 16 21:06:56.982720 kernel: acpiphp: Slot [16] registered Jan 16 21:06:56.982736 kernel: acpiphp: Slot [17] registered Jan 16 21:06:56.982753 kernel: acpiphp: Slot [18] registered Jan 16 21:06:56.982770 kernel: acpiphp: Slot [19] registered Jan 16 21:06:56.982787 kernel: acpiphp: Slot [20] registered Jan 16 21:06:56.982802 kernel: acpiphp: Slot [21] registered Jan 16 21:06:56.982819 kernel: acpiphp: Slot [22] registered Jan 16 21:06:56.982839 kernel: acpiphp: Slot [23] registered Jan 16 21:06:56.982856 kernel: acpiphp: Slot [24] registered Jan 16 21:06:56.982872 kernel: acpiphp: Slot [25] registered Jan 16 21:06:56.982889 kernel: acpiphp: Slot [26] registered Jan 16 21:06:56.982905 kernel: acpiphp: Slot [27] registered Jan 16 21:06:56.982922 kernel: acpiphp: Slot [28] registered Jan 16 21:06:56.982938 kernel: acpiphp: Slot [29] registered Jan 16 21:06:56.984476 kernel: acpiphp: Slot [30] registered Jan 16 21:06:56.984509 kernel: acpiphp: Slot [31] registered Jan 16 21:06:56.984526 kernel: PCI host bridge to bus 0000:00 Jan 16 21:06:56.984845 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 16 21:06:56.985055 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 16 21:06:56.985228 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 16 21:06:56.985400 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jan 16 21:06:56.985577 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jan 16 21:06:56.985747 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 16 21:06:56.985984 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Jan 16 21:06:56.986195 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Jan 16 21:06:56.986399 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Jan 16 21:06:56.986650 kernel: pci 0000:00:01.1: BAR 4 [io 0xc1e0-0xc1ef] Jan 16 21:06:56.986847 kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Jan 16 21:06:56.989133 kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Jan 16 21:06:56.989363 kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Jan 16 21:06:56.989560 kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Jan 16 21:06:56.989766 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Jan 16 21:06:56.989997 kernel: pci 0000:00:01.2: BAR 4 [io 0xc180-0xc19f] Jan 16 21:06:56.990199 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Jan 16 21:06:56.990392 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 16 21:06:56.990582 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 16 21:06:56.990780 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Jan 16 21:06:56.990992 kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Jan 16 21:06:56.991186 kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Jan 16 21:06:56.991375 kernel: pci 0000:00:02.0: BAR 4 [mem 0xfebf0000-0xfebf0fff] Jan 16 21:06:56.991564 kernel: pci 0000:00:02.0: ROM [mem 0xfebe0000-0xfebeffff pref] Jan 16 21:06:56.991755 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 16 21:06:56.991983 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Jan 16 21:06:56.992186 kernel: pci 0000:00:03.0: BAR 0 [io 0xc1a0-0xc1bf] Jan 16 21:06:56.992378 kernel: pci 0000:00:03.0: BAR 1 [mem 0xfebf1000-0xfebf1fff] Jan 16 21:06:56.992569 kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Jan 16 21:06:56.992786 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Jan 16 21:06:56.993893 kernel: pci 0000:00:04.0: BAR 0 [io 0xc1c0-0xc1df] Jan 16 21:06:56.994160 kernel: pci 0000:00:04.0: BAR 1 [mem 0xfebf2000-0xfebf2fff] Jan 16 21:06:56.994357 kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 16 21:06:56.994561 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 conventional PCI endpoint Jan 16 21:06:56.994756 kernel: pci 0000:00:05.0: BAR 0 [io 0xc100-0xc13f] Jan 16 21:06:56.994962 kernel: pci 0000:00:05.0: BAR 1 [mem 0xfebf3000-0xfebf3fff] Jan 16 21:06:56.995157 kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 16 21:06:56.995386 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Jan 16 21:06:56.995578 kernel: pci 0000:00:06.0: BAR 0 [io 0xc000-0xc07f] Jan 16 21:06:56.995769 kernel: pci 0000:00:06.0: BAR 1 [mem 0xfebf4000-0xfebf4fff] Jan 16 21:06:56.996081 kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Jan 16 21:06:56.996294 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Jan 16 21:06:56.996489 kernel: pci 0000:00:07.0: BAR 0 [io 0xc080-0xc0ff] Jan 16 21:06:56.996687 kernel: pci 0000:00:07.0: BAR 1 [mem 0xfebf5000-0xfebf5fff] Jan 16 21:06:56.996895 kernel: pci 0000:00:07.0: BAR 4 [mem 0xfe814000-0xfe817fff 64bit pref] Jan 16 21:06:56.999195 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Jan 16 21:06:56.999409 kernel: pci 0000:00:08.0: BAR 0 [io 0xc140-0xc17f] Jan 16 21:06:56.999601 kernel: pci 0000:00:08.0: BAR 4 [mem 0xfe818000-0xfe81bfff 64bit pref] Jan 16 21:06:56.999630 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 16 21:06:56.999647 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 16 21:06:56.999664 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 16 21:06:56.999681 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 16 21:06:56.999698 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 16 21:06:56.999715 kernel: iommu: Default domain type: Translated Jan 16 21:06:56.999733 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 16 21:06:56.999753 kernel: PCI: Using ACPI for IRQ routing Jan 16 21:06:56.999771 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 16 21:06:56.999787 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 16 21:06:56.999803 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Jan 16 21:06:57.001758 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 16 21:06:57.002006 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 16 21:06:57.002203 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 16 21:06:57.002232 kernel: vgaarb: loaded Jan 16 21:06:57.002249 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 16 21:06:57.002267 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 16 21:06:57.002284 kernel: clocksource: Switched to clocksource kvm-clock Jan 16 21:06:57.002301 kernel: VFS: Disk quotas dquot_6.6.0 Jan 16 21:06:57.002318 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 16 21:06:57.002335 kernel: pnp: PnP ACPI init Jan 16 21:06:57.002356 kernel: pnp: PnP ACPI: found 4 devices Jan 16 21:06:57.002373 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 16 21:06:57.002389 kernel: NET: Registered PF_INET protocol family Jan 16 21:06:57.002406 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 16 21:06:57.002424 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jan 16 21:06:57.002442 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 16 21:06:57.002459 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 16 21:06:57.002479 kernel: TCP bind hash table entries: 16384 (order: 7, 524288 bytes, linear) Jan 16 21:06:57.002496 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jan 16 21:06:57.002513 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jan 16 21:06:57.002530 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jan 16 21:06:57.002547 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 16 21:06:57.002564 kernel: NET: Registered PF_XDP protocol family Jan 16 21:06:57.002802 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 16 21:06:57.004529 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 16 21:06:57.004765 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 16 21:06:57.007107 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jan 16 21:06:57.007307 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jan 16 21:06:57.007510 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 16 21:06:57.007710 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 16 21:06:57.007742 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 16 21:06:57.007938 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x720 took 41677 usecs Jan 16 21:06:57.008147 kernel: PCI: CLS 0 bytes, default 64 Jan 16 21:06:57.008166 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jan 16 21:06:57.008184 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39654230, max_idle_ns: 440795207432 ns Jan 16 21:06:57.008201 kernel: Initialise system trusted keyrings Jan 16 21:06:57.008219 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jan 16 21:06:57.008241 kernel: Key type asymmetric registered Jan 16 21:06:57.008258 kernel: Asymmetric key parser 'x509' registered Jan 16 21:06:57.008274 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 250) Jan 16 21:06:57.008291 kernel: io scheduler mq-deadline registered Jan 16 21:06:57.008308 kernel: io scheduler kyber registered Jan 16 21:06:57.008325 kernel: io scheduler bfq registered Jan 16 21:06:57.008342 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 16 21:06:57.008363 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 16 21:06:57.008380 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 16 21:06:57.008397 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 16 21:06:57.008414 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 16 21:06:57.008431 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 16 21:06:57.008448 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 16 21:06:57.008465 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 16 21:06:57.008485 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 16 21:06:57.008510 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 16 21:06:57.009395 kernel: rtc_cmos 00:03: RTC can wake from S4 Jan 16 21:06:57.009617 kernel: rtc_cmos 00:03: registered as rtc0 Jan 16 21:06:57.015138 kernel: rtc_cmos 00:03: setting system clock to 2026-01-16T21:06:55 UTC (1768597615) Jan 16 21:06:57.015381 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jan 16 21:06:57.015413 kernel: intel_pstate: CPU model not supported Jan 16 21:06:57.015431 kernel: NET: Registered PF_INET6 protocol family Jan 16 21:06:57.015449 kernel: Segment Routing with IPv6 Jan 16 21:06:57.015466 kernel: In-situ OAM (IOAM) with IPv6 Jan 16 21:06:57.015483 kernel: NET: Registered PF_PACKET protocol family Jan 16 21:06:57.015500 kernel: Key type dns_resolver registered Jan 16 21:06:57.015518 kernel: IPI shorthand broadcast: enabled Jan 16 21:06:57.015536 kernel: sched_clock: Marking stable (1869003054, 149062619)->(2060055477, -41989804) Jan 16 21:06:57.015569 kernel: registered taskstats version 1 Jan 16 21:06:57.015586 kernel: Loading compiled-in X.509 certificates Jan 16 21:06:57.015603 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.12.65-flatcar: a9591db9912320a48a0589d0293fff3e535b90df' Jan 16 21:06:57.015620 kernel: Demotion targets for Node 0: null Jan 16 21:06:57.015636 kernel: Key type .fscrypt registered Jan 16 21:06:57.015654 kernel: Key type fscrypt-provisioning registered Jan 16 21:06:57.015694 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 16 21:06:57.015718 kernel: ima: Allocated hash algorithm: sha1 Jan 16 21:06:57.015735 kernel: ima: No architecture policies found Jan 16 21:06:57.015753 kernel: clk: Disabling unused clocks Jan 16 21:06:57.015771 kernel: Freeing unused kernel image (initmem) memory: 15536K Jan 16 21:06:57.015789 kernel: Write protecting the kernel read-only data: 47104k Jan 16 21:06:57.015805 kernel: Freeing unused kernel image (rodata/data gap) memory: 1124K Jan 16 21:06:57.015823 kernel: Run /init as init process Jan 16 21:06:57.015844 kernel: with arguments: Jan 16 21:06:57.015862 kernel: /init Jan 16 21:06:57.015880 kernel: with environment: Jan 16 21:06:57.015897 kernel: HOME=/ Jan 16 21:06:57.015915 kernel: TERM=linux Jan 16 21:06:57.015933 kernel: SCSI subsystem initialized Jan 16 21:06:57.015965 kernel: libata version 3.00 loaded. Jan 16 21:06:57.016215 kernel: ata_piix 0000:00:01.1: version 2.13 Jan 16 21:06:57.016442 kernel: scsi host0: ata_piix Jan 16 21:06:57.016668 kernel: scsi host1: ata_piix Jan 16 21:06:57.016708 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 lpm-pol 0 Jan 16 21:06:57.016727 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 lpm-pol 0 Jan 16 21:06:57.016745 kernel: ACPI: bus type USB registered Jan 16 21:06:57.016769 kernel: usbcore: registered new interface driver usbfs Jan 16 21:06:57.016788 kernel: usbcore: registered new interface driver hub Jan 16 21:06:57.016804 kernel: usbcore: registered new device driver usb Jan 16 21:06:57.021159 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 16 21:06:57.021416 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 16 21:06:57.021615 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 16 21:06:57.021820 kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c180 Jan 16 21:06:57.022065 kernel: hub 1-0:1.0: USB hub found Jan 16 21:06:57.022277 kernel: hub 1-0:1.0: 2 ports detected Jan 16 21:06:57.022494 kernel: virtio_blk virtio4: 1/0/0 default/read/poll queues Jan 16 21:06:57.022687 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jan 16 21:06:57.022710 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 16 21:06:57.022729 kernel: GPT:16515071 != 125829119 Jan 16 21:06:57.022746 kernel: GPT:Alternate GPT header not at the end of the disk. Jan 16 21:06:57.022762 kernel: GPT:16515071 != 125829119 Jan 16 21:06:57.022780 kernel: GPT: Use GNU Parted to correct GPT errors. Jan 16 21:06:57.022801 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 16 21:06:57.026101 kernel: virtio_blk virtio5: 1/0/0 default/read/poll queues Jan 16 21:06:57.026352 kernel: virtio_blk virtio5: [vdb] 916 512-byte logical blocks (469 kB/458 KiB) Jan 16 21:06:57.026561 kernel: virtio_scsi virtio3: 2/0/0 default/read/poll queues Jan 16 21:06:57.026780 kernel: scsi host2: Virtio SCSI HBA Jan 16 21:06:57.026816 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 16 21:06:57.026835 kernel: device-mapper: uevent: version 1.0.3 Jan 16 21:06:57.026855 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev Jan 16 21:06:57.026873 kernel: device-mapper: verity: sha256 using shash "sha256-generic" Jan 16 21:06:57.026891 kernel: raid6: avx2x4 gen() 16747 MB/s Jan 16 21:06:57.026909 kernel: raid6: avx2x2 gen() 16829 MB/s Jan 16 21:06:57.026928 kernel: raid6: avx2x1 gen() 13262 MB/s Jan 16 21:06:57.026946 kernel: raid6: using algorithm avx2x2 gen() 16829 MB/s Jan 16 21:06:57.026982 kernel: raid6: .... xor() 21478 MB/s, rmw enabled Jan 16 21:06:57.027001 kernel: raid6: using avx2x2 recovery algorithm Jan 16 21:06:57.027020 kernel: xor: automatically using best checksumming function avx Jan 16 21:06:57.027038 kernel: Btrfs loaded, zoned=no, fsverity=no Jan 16 21:06:57.027057 kernel: BTRFS: device fsid a5f82c06-1ff1-43b3-a650-214802f1359b devid 1 transid 35 /dev/mapper/usr (253:0) scanned by mount (162) Jan 16 21:06:57.027075 kernel: BTRFS info (device dm-0): first mount of filesystem a5f82c06-1ff1-43b3-a650-214802f1359b Jan 16 21:06:57.027094 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Jan 16 21:06:57.027116 kernel: BTRFS info (device dm-0): disabling log replay at mount time Jan 16 21:06:57.027133 kernel: BTRFS info (device dm-0): enabling free space tree Jan 16 21:06:57.027150 kernel: loop: module loaded Jan 16 21:06:57.027169 kernel: loop0: detected capacity change from 0 to 100536 Jan 16 21:06:57.027186 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jan 16 21:06:57.027207 systemd[1]: Successfully made /usr/ read-only. Jan 16 21:06:57.027233 systemd[1]: systemd 257.9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +IPE +SMACK +SECCOMP -GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -BTF -XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE) Jan 16 21:06:57.027253 systemd[1]: Detected virtualization kvm. Jan 16 21:06:57.027272 systemd[1]: Detected architecture x86-64. Jan 16 21:06:57.027290 systemd[1]: Running in initrd. Jan 16 21:06:57.027308 systemd[1]: No hostname configured, using default hostname. Jan 16 21:06:57.027327 systemd[1]: Hostname set to . Jan 16 21:06:57.027348 systemd[1]: Initializing machine ID from SMBIOS/DMI UUID. Jan 16 21:06:57.027369 systemd[1]: Queued start job for default target initrd.target. Jan 16 21:06:57.027388 systemd[1]: Unnecessary job was removed for dev-mapper-usr.device - /dev/mapper/usr. Jan 16 21:06:57.027406 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 16 21:06:57.027425 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 16 21:06:57.027445 systemd[1]: Expecting device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - /dev/disk/by-label/EFI-SYSTEM... Jan 16 21:06:57.027465 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Jan 16 21:06:57.027489 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Jan 16 21:06:57.027509 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Jan 16 21:06:57.027528 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 16 21:06:57.027547 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jan 16 21:06:57.027568 systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System. Jan 16 21:06:57.027590 systemd[1]: Reached target paths.target - Path Units. Jan 16 21:06:57.027608 systemd[1]: Reached target slices.target - Slice Units. Jan 16 21:06:57.027627 systemd[1]: Reached target swap.target - Swaps. Jan 16 21:06:57.027646 systemd[1]: Reached target timers.target - Timer Units. Jan 16 21:06:57.027664 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Jan 16 21:06:57.027682 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jan 16 21:06:57.032054 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jan 16 21:06:57.032087 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jan 16 21:06:57.032104 systemd[1]: Listening on systemd-journald.socket - Journal Sockets. Jan 16 21:06:57.032122 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jan 16 21:06:57.032141 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jan 16 21:06:57.032160 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jan 16 21:06:57.032180 systemd[1]: Reached target sockets.target - Socket Units. Jan 16 21:06:57.032199 systemd[1]: afterburn-network-kargs.service - Afterburn Initrd Setup Network Kernel Arguments was skipped because no trigger condition checks were met. Jan 16 21:06:57.032221 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Jan 16 21:06:57.032240 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jan 16 21:06:57.032259 systemd[1]: Finished network-cleanup.service - Network Cleanup. Jan 16 21:06:57.032279 systemd[1]: systemd-battery-check.service - Check battery level during early boot was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/class/power_supply). Jan 16 21:06:57.032298 systemd[1]: Starting systemd-fsck-usr.service... Jan 16 21:06:57.032316 systemd[1]: Starting systemd-journald.service - Journal Service... Jan 16 21:06:57.032336 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jan 16 21:06:57.032359 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:06:57.032378 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Jan 16 21:06:57.032397 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jan 16 21:06:57.032419 systemd[1]: Finished systemd-fsck-usr.service. Jan 16 21:06:57.032487 systemd-journald[300]: Collecting audit messages is enabled. Jan 16 21:06:57.032528 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Jan 16 21:06:57.032551 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jan 16 21:06:57.032570 kernel: Bridge firewalling registered Jan 16 21:06:57.032589 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jan 16 21:06:57.032608 kernel: audit: type=1130 audit(1768597617.018:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.032626 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jan 16 21:06:57.032646 systemd-journald[300]: Journal started Jan 16 21:06:57.032685 systemd-journald[300]: Runtime Journal (/run/log/journal/88d416ebbba7433ba143a63d0c5a9e9e) is 4.8M, max 39.1M, 34.2M free. Jan 16 21:06:57.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.016620 systemd-modules-load[302]: Inserted module 'br_netfilter' Jan 16 21:06:57.100081 systemd[1]: Started systemd-journald.service - Journal Service. Jan 16 21:06:57.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.105003 kernel: audit: type=1130 audit(1768597617.099:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.105203 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Jan 16 21:06:57.111400 kernel: audit: type=1130 audit(1768597617.104:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.112909 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:06:57.123290 kernel: audit: type=1130 audit(1768597617.112:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.120117 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jan 16 21:06:57.124968 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jan 16 21:06:57.135089 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Jan 16 21:06:57.138106 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jan 16 21:06:57.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.145463 kernel: audit: type=1130 audit(1768597617.138:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.146000 audit: BPF prog-id=6 op=LOAD Jan 16 21:06:57.149996 kernel: audit: type=1334 audit(1768597617.146:7): prog-id=6 op=LOAD Jan 16 21:06:57.149991 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jan 16 21:06:57.155356 systemd-tmpfiles[321]: /usr/lib/tmpfiles.d/var.conf:14: Duplicate line for path "/var/log", ignoring. Jan 16 21:06:57.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.158056 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 16 21:06:57.163249 kernel: audit: type=1130 audit(1768597617.157:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.165448 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 16 21:06:57.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.171045 kernel: audit: type=1130 audit(1768597617.165:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.175466 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 16 21:06:57.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.180977 kernel: audit: type=1130 audit(1768597617.175:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.178150 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jan 16 21:06:57.206490 dracut-cmdline[339]: dracut-109 Jan 16 21:06:57.210978 dracut-cmdline[339]: Using kernel command line parameters: SYSTEMD_SULOGIN_FORCE=1 rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=e880b5400e832e1de59b993d9ba6b86a9089175f10b4985da8b7b47cc8c74099 Jan 16 21:06:57.240650 systemd-resolved[328]: Positive Trust Anchors: Jan 16 21:06:57.240664 systemd-resolved[328]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 16 21:06:57.240669 systemd-resolved[328]: . IN DS 38696 8 2 683d2d0acb8c9b712a1948b27f741219298d0a450d612c483af444a4c0fb2b16 Jan 16 21:06:57.240738 systemd-resolved[328]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa resolver.arpa corp home internal intranet lan local private test Jan 16 21:06:57.275119 systemd-resolved[328]: Defaulting to hostname 'linux'. Jan 16 21:06:57.276415 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jan 16 21:06:57.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.277867 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jan 16 21:06:57.338998 kernel: Loading iSCSI transport class v2.0-870. Jan 16 21:06:57.356015 kernel: iscsi: registered transport (tcp) Jan 16 21:06:57.384006 kernel: iscsi: registered transport (qla4xxx) Jan 16 21:06:57.384085 kernel: QLogic iSCSI HBA Driver Jan 16 21:06:57.415371 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jan 16 21:06:57.438392 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jan 16 21:06:57.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.441509 systemd[1]: Reached target network-pre.target - Preparation for Network. Jan 16 21:06:57.498839 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jan 16 21:06:57.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.506125 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jan 16 21:06:57.510147 systemd[1]: Starting parse-ip-for-networkd.service - Write systemd-networkd units from cmdline... Jan 16 21:06:57.544317 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jan 16 21:06:57.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.546000 audit: BPF prog-id=7 op=LOAD Jan 16 21:06:57.546000 audit: BPF prog-id=8 op=LOAD Jan 16 21:06:57.548122 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 16 21:06:57.579464 systemd-udevd[574]: Using default interface naming scheme 'v257'. Jan 16 21:06:57.592849 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 16 21:06:57.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.597448 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jan 16 21:06:57.633551 dracut-pre-trigger[633]: rd.md=0: removing MD RAID activation Jan 16 21:06:57.648194 systemd[1]: Finished parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jan 16 21:06:57.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.649000 audit: BPF prog-id=9 op=LOAD Jan 16 21:06:57.652163 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jan 16 21:06:57.674581 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jan 16 21:06:57.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.677521 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jan 16 21:06:57.705001 systemd-networkd[690]: lo: Link UP Jan 16 21:06:57.705009 systemd-networkd[690]: lo: Gained carrier Jan 16 21:06:57.706377 systemd[1]: Started systemd-networkd.service - Network Configuration. Jan 16 21:06:57.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.706990 systemd[1]: Reached target network.target - Network. Jan 16 21:06:57.771117 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jan 16 21:06:57.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.775500 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jan 16 21:06:57.884356 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - /dev/disk/by-label/EFI-SYSTEM. Jan 16 21:06:57.911381 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT. Jan 16 21:06:57.924253 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM. Jan 16 21:06:57.944172 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A. Jan 16 21:06:57.947140 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Jan 16 21:06:57.966680 disk-uuid[737]: Primary Header is updated. Jan 16 21:06:57.966680 disk-uuid[737]: Secondary Entries is updated. Jan 16 21:06:57.966680 disk-uuid[737]: Secondary Header is updated. Jan 16 21:06:57.982895 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input2 Jan 16 21:06:57.982993 kernel: cryptd: max_cpu_qlen set to 1000 Jan 16 21:06:57.988286 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 16 21:06:57.988474 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:06:57.989117 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:06:57.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:57.993247 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:06:58.098728 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:06:58.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:58.118749 kernel: AES CTR mode by8 optimization enabled Jan 16 21:06:58.122220 systemd-networkd[690]: eth0: Found matching .network file, based on potentially unpredictable interface name: /usr/lib/systemd/network/yy-digitalocean.network Jan 16 21:06:58.122231 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Jan 16 21:06:58.138115 systemd-networkd[690]: eth0: Link UP Jan 16 21:06:58.138421 systemd-networkd[690]: eth1: Found matching .network file, based on potentially unpredictable interface name: /usr/lib/systemd/network/zz-default.network Jan 16 21:06:58.138425 systemd-networkd[690]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Jan 16 21:06:58.154387 systemd-networkd[690]: eth0: Gained carrier Jan 16 21:06:58.154406 systemd-networkd[690]: eth0: Found matching .network file, based on potentially unpredictable interface name: /usr/lib/systemd/network/yy-digitalocean.network Jan 16 21:06:58.159472 systemd-networkd[690]: eth1: Link UP Jan 16 21:06:58.159662 systemd-networkd[690]: eth1: Gained carrier Jan 16 21:06:58.159679 systemd-networkd[690]: eth1: Found matching .network file, based on potentially unpredictable interface name: /usr/lib/systemd/network/zz-default.network Jan 16 21:06:58.169030 systemd-networkd[690]: eth0: DHCPv4 address 64.23.236.65/20, gateway 64.23.224.1 acquired from 169.254.169.253 Jan 16 21:06:58.178723 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jan 16 21:06:58.180031 systemd-networkd[690]: eth1: DHCPv4 address 10.124.0.23/20 acquired from 169.254.169.253 Jan 16 21:06:58.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:58.182655 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jan 16 21:06:58.183270 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 16 21:06:58.184458 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jan 16 21:06:58.186587 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jan 16 21:06:58.214810 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jan 16 21:06:58.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.075262 disk-uuid[738]: Warning: The kernel is still using the old partition table. Jan 16 21:06:59.075262 disk-uuid[738]: The new table will be used at the next reboot or after you Jan 16 21:06:59.075262 disk-uuid[738]: run partprobe(8) or kpartx(8) Jan 16 21:06:59.075262 disk-uuid[738]: The operation has completed successfully. Jan 16 21:06:59.086257 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 16 21:06:59.086461 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Jan 16 21:06:59.096926 kernel: kauditd_printk_skb: 16 callbacks suppressed Jan 16 21:06:59.096997 kernel: audit: type=1130 audit(1768597619.086:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.097020 kernel: audit: type=1131 audit(1768597619.086:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.092035 systemd[1]: Starting ignition-setup.service - Ignition (setup)... Jan 16 21:06:59.139565 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 (254:6) scanned by mount (826) Jan 16 21:06:59.139690 kernel: BTRFS info (device vda6): first mount of filesystem 984b7cbf-e15c-4ac8-8ab0-1fb2c55516eb Jan 16 21:06:59.141010 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jan 16 21:06:59.146594 kernel: BTRFS info (device vda6): turning on async discard Jan 16 21:06:59.146703 kernel: BTRFS info (device vda6): enabling free space tree Jan 16 21:06:59.160635 kernel: BTRFS info (device vda6): last unmount of filesystem 984b7cbf-e15c-4ac8-8ab0-1fb2c55516eb Jan 16 21:06:59.160779 kernel: audit: type=1130 audit(1768597619.156:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.156449 systemd[1]: Finished ignition-setup.service - Ignition (setup). Jan 16 21:06:59.159207 systemd[1]: Starting ignition-fetch-offline.service - Ignition (fetch-offline)... Jan 16 21:06:59.285451 systemd-networkd[690]: eth0: Gained IPv6LL Jan 16 21:06:59.444168 ignition[845]: Ignition 2.24.0 Jan 16 21:06:59.444190 ignition[845]: Stage: fetch-offline Jan 16 21:06:59.444293 ignition[845]: no configs at "/usr/lib/ignition/base.d" Jan 16 21:06:59.444313 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:06:59.444565 ignition[845]: parsed url from cmdline: "" Jan 16 21:06:59.444572 ignition[845]: no config URL provided Jan 16 21:06:59.444769 ignition[845]: reading system config file "/usr/lib/ignition/user.ign" Jan 16 21:06:59.444794 ignition[845]: no config at "/usr/lib/ignition/user.ign" Jan 16 21:06:59.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.447918 systemd[1]: Finished ignition-fetch-offline.service - Ignition (fetch-offline). Jan 16 21:06:59.455884 kernel: audit: type=1130 audit(1768597619.448:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.444805 ignition[845]: failed to fetch config: resource requires networking Jan 16 21:06:59.452495 systemd[1]: Starting ignition-fetch.service - Ignition (fetch)... Jan 16 21:06:59.445443 ignition[845]: Ignition finished successfully Jan 16 21:06:59.496741 ignition[855]: Ignition 2.24.0 Jan 16 21:06:59.497602 ignition[855]: Stage: fetch Jan 16 21:06:59.497877 ignition[855]: no configs at "/usr/lib/ignition/base.d" Jan 16 21:06:59.497894 ignition[855]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:06:59.498112 ignition[855]: parsed url from cmdline: "" Jan 16 21:06:59.498116 ignition[855]: no config URL provided Jan 16 21:06:59.498133 ignition[855]: reading system config file "/usr/lib/ignition/user.ign" Jan 16 21:06:59.498142 ignition[855]: no config at "/usr/lib/ignition/user.ign" Jan 16 21:06:59.498175 ignition[855]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Jan 16 21:06:59.513207 ignition[855]: GET result: OK Jan 16 21:06:59.513355 ignition[855]: parsing config with SHA512: b4c6bffd2b39cbbf57fd16cd646d10e866246f833fffd469aa352aa00f7c7e6b6ff211ef386d0aaafe1c06306c8677ffbded3cb9e4fb39b71dce1dc106aa6e58 Jan 16 21:06:59.522446 unknown[855]: fetched base config from "system" Jan 16 21:06:59.523027 unknown[855]: fetched base config from "system" Jan 16 21:06:59.523038 unknown[855]: fetched user config from "digitalocean" Jan 16 21:06:59.523273 ignition[855]: fetch: fetch complete Jan 16 21:06:59.523280 ignition[855]: fetch: fetch passed Jan 16 21:06:59.523357 ignition[855]: Ignition finished successfully Jan 16 21:06:59.527630 systemd[1]: Finished ignition-fetch.service - Ignition (fetch). Jan 16 21:06:59.533117 kernel: audit: type=1130 audit(1768597619.527:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.531225 systemd[1]: Starting ignition-kargs.service - Ignition (kargs)... Jan 16 21:06:59.579104 ignition[861]: Ignition 2.24.0 Jan 16 21:06:59.579971 ignition[861]: Stage: kargs Jan 16 21:06:59.580201 ignition[861]: no configs at "/usr/lib/ignition/base.d" Jan 16 21:06:59.580215 ignition[861]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:06:59.580836 ignition[861]: kargs: kargs passed Jan 16 21:06:59.580900 ignition[861]: Ignition finished successfully Jan 16 21:06:59.583852 systemd[1]: Finished ignition-kargs.service - Ignition (kargs). Jan 16 21:06:59.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.588134 systemd[1]: Starting ignition-disks.service - Ignition (disks)... Jan 16 21:06:59.589553 kernel: audit: type=1130 audit(1768597619.583:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.628665 ignition[867]: Ignition 2.24.0 Jan 16 21:06:59.628698 ignition[867]: Stage: disks Jan 16 21:06:59.629051 ignition[867]: no configs at "/usr/lib/ignition/base.d" Jan 16 21:06:59.629075 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:06:59.630019 ignition[867]: disks: disks passed Jan 16 21:06:59.630080 ignition[867]: Ignition finished successfully Jan 16 21:06:59.632434 systemd[1]: Finished ignition-disks.service - Ignition (disks). Jan 16 21:06:59.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.633930 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jan 16 21:06:59.638098 kernel: audit: type=1130 audit(1768597619.632:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.638591 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jan 16 21:06:59.639169 systemd[1]: Reached target local-fs.target - Local File Systems. Jan 16 21:06:59.640297 systemd[1]: Reached target sysinit.target - System Initialization. Jan 16 21:06:59.641253 systemd[1]: Reached target basic.target - Basic System. Jan 16 21:06:59.643894 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Jan 16 21:06:59.686272 systemd-fsck[876]: ROOT: clean, 15/456736 files, 38230/456704 blocks Jan 16 21:06:59.691277 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Jan 16 21:06:59.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.696159 systemd[1]: Mounting sysroot.mount - /sysroot... Jan 16 21:06:59.698380 kernel: audit: type=1130 audit(1768597619.691:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.841977 kernel: EXT4-fs (vda9): mounted filesystem ec5ae8d3-548b-4a34-bd68-b1a953fcffb6 r/w with ordered data mode. Quota mode: none. Jan 16 21:06:59.843340 systemd[1]: Mounted sysroot.mount - /sysroot. Jan 16 21:06:59.844994 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jan 16 21:06:59.848105 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jan 16 21:06:59.850077 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Jan 16 21:06:59.853128 systemd[1]: Starting flatcar-afterburn-network.service - Flatcar Afterburn network service... Jan 16 21:06:59.870159 systemd[1]: Starting flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent... Jan 16 21:06:59.870806 systemd[1]: ignition-remount-sysroot.service - Remount /sysroot read-write for Ignition was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jan 16 21:06:59.870853 systemd[1]: Reached target ignition-diskful.target - Ignition Boot Disk Setup. Jan 16 21:06:59.876875 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Jan 16 21:06:59.883202 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Jan 16 21:06:59.902988 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 (254:6) scanned by mount (884) Jan 16 21:06:59.920119 kernel: BTRFS info (device vda6): first mount of filesystem 984b7cbf-e15c-4ac8-8ab0-1fb2c55516eb Jan 16 21:06:59.927006 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jan 16 21:06:59.945095 kernel: BTRFS info (device vda6): turning on async discard Jan 16 21:06:59.945173 kernel: BTRFS info (device vda6): enabling free space tree Jan 16 21:06:59.946701 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jan 16 21:06:59.971824 coreos-metadata[887]: Jan 16 21:06:59.971 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jan 16 21:06:59.983120 coreos-metadata[886]: Jan 16 21:06:59.983 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jan 16 21:06:59.986975 coreos-metadata[887]: Jan 16 21:06:59.986 INFO Fetch successful Jan 16 21:06:59.990338 coreos-metadata[887]: Jan 16 21:06:59.990 INFO wrote hostname ci-4580.0.0-p-6168a244cc to /sysroot/etc/hostname Jan 16 21:06:59.992579 systemd[1]: Finished flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jan 16 21:06:59.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.997974 kernel: audit: type=1130 audit(1768597619.992:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:06:59.998041 coreos-metadata[886]: Jan 16 21:06:59.997 INFO Fetch successful Jan 16 21:07:00.002707 systemd[1]: flatcar-afterburn-network.service: Deactivated successfully. Jan 16 21:07:00.004114 systemd[1]: Finished flatcar-afterburn-network.service - Flatcar Afterburn network service. Jan 16 21:07:00.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-afterburn-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.010016 kernel: audit: type=1130 audit(1768597620.004:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-afterburn-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-afterburn-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.047297 systemd-networkd[690]: eth1: Gained IPv6LL Jan 16 21:07:00.187148 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Jan 16 21:07:00.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.191244 systemd[1]: Starting ignition-mount.service - Ignition (mount)... Jan 16 21:07:00.194229 systemd[1]: Starting sysroot-boot.service - /sysroot/boot... Jan 16 21:07:00.226988 systemd[1]: sysroot-oem.mount: Deactivated successfully. Jan 16 21:07:00.228165 kernel: BTRFS info (device vda6): last unmount of filesystem 984b7cbf-e15c-4ac8-8ab0-1fb2c55516eb Jan 16 21:07:00.262811 systemd[1]: Finished sysroot-boot.service - /sysroot/boot. Jan 16 21:07:00.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.269644 ignition[990]: INFO : Ignition 2.24.0 Jan 16 21:07:00.271089 ignition[990]: INFO : Stage: mount Jan 16 21:07:00.271089 ignition[990]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 16 21:07:00.271089 ignition[990]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:07:00.274170 ignition[990]: INFO : mount: mount passed Jan 16 21:07:00.274170 ignition[990]: INFO : Ignition finished successfully Jan 16 21:07:00.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.276427 systemd[1]: Finished ignition-mount.service - Ignition (mount). Jan 16 21:07:00.280409 systemd[1]: Starting ignition-files.service - Ignition (files)... Jan 16 21:07:00.301561 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jan 16 21:07:00.329264 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 (254:6) scanned by mount (1001) Jan 16 21:07:00.329357 kernel: BTRFS info (device vda6): first mount of filesystem 984b7cbf-e15c-4ac8-8ab0-1fb2c55516eb Jan 16 21:07:00.332581 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jan 16 21:07:00.337177 kernel: BTRFS info (device vda6): turning on async discard Jan 16 21:07:00.337316 kernel: BTRFS info (device vda6): enabling free space tree Jan 16 21:07:00.341527 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jan 16 21:07:00.380276 ignition[1018]: INFO : Ignition 2.24.0 Jan 16 21:07:00.380276 ignition[1018]: INFO : Stage: files Jan 16 21:07:00.381677 ignition[1018]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 16 21:07:00.381677 ignition[1018]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:07:00.381677 ignition[1018]: DEBUG : files: compiled without relabeling support, skipping Jan 16 21:07:00.389140 ignition[1018]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jan 16 21:07:00.389140 ignition[1018]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jan 16 21:07:00.389140 ignition[1018]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jan 16 21:07:00.389140 ignition[1018]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jan 16 21:07:00.395819 ignition[1018]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jan 16 21:07:00.395819 ignition[1018]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jan 16 21:07:00.395819 ignition[1018]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jan 16 21:07:00.395819 ignition[1018]: INFO : files: op(4): [started] processing unit "etcd-member.service" Jan 16 21:07:00.389298 unknown[1018]: wrote ssh authorized keys file for user: core Jan 16 21:07:00.401920 ignition[1018]: INFO : files: op(4): op(5): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: op(4): op(5): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: op(4): [finished] processing unit "etcd-member.service" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: op(6): [started] setting preset to enabled for "etcd-member.service" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: op(6): [finished] setting preset to enabled for "etcd-member.service" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: createResultFile: createFiles: op(7): [started] writing file "/sysroot/etc/.ignition-result.json" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: createResultFile: createFiles: op(7): [finished] writing file "/sysroot/etc/.ignition-result.json" Jan 16 21:07:00.401920 ignition[1018]: INFO : files: files passed Jan 16 21:07:00.401920 ignition[1018]: INFO : Ignition finished successfully Jan 16 21:07:00.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.401660 systemd[1]: Finished ignition-files.service - Ignition (files). Jan 16 21:07:00.405208 systemd[1]: Starting ignition-quench.service - Ignition (record completion)... Jan 16 21:07:00.410253 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Jan 16 21:07:00.431827 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 16 21:07:00.432267 systemd[1]: Finished ignition-quench.service - Ignition (record completion). Jan 16 21:07:00.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.448466 initrd-setup-root-after-ignition[1049]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jan 16 21:07:00.449870 initrd-setup-root-after-ignition[1049]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Jan 16 21:07:00.451413 initrd-setup-root-after-ignition[1053]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jan 16 21:07:00.454587 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Jan 16 21:07:00.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.455431 systemd[1]: Reached target ignition-complete.target - Ignition Complete. Jan 16 21:07:00.457856 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Jan 16 21:07:00.537705 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 16 21:07:00.538418 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Jan 16 21:07:00.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.539748 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jan 16 21:07:00.540565 systemd[1]: Reached target initrd.target - Initrd Default Target. Jan 16 21:07:00.542245 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Jan 16 21:07:00.543917 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jan 16 21:07:00.585164 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jan 16 21:07:00.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.587983 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jan 16 21:07:00.616864 systemd[1]: Unnecessary job was removed for dev-mapper-usr.device - /dev/mapper/usr. Jan 16 21:07:00.617228 systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Jan 16 21:07:00.618616 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 16 21:07:00.619893 systemd[1]: Stopped target timers.target - Timer Units. Jan 16 21:07:00.621014 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 16 21:07:00.621273 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jan 16 21:07:00.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.623131 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jan 16 21:07:00.623936 systemd[1]: Stopped target basic.target - Basic System. Jan 16 21:07:00.625169 systemd[1]: Stopped target ignition-complete.target - Ignition Complete. Jan 16 21:07:00.626044 systemd[1]: Stopped target ignition-diskful.target - Ignition Boot Disk Setup. Jan 16 21:07:00.627186 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jan 16 21:07:00.628402 systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System. Jan 16 21:07:00.629557 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jan 16 21:07:00.630787 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jan 16 21:07:00.631874 systemd[1]: Stopped target sysinit.target - System Initialization. Jan 16 21:07:00.633026 systemd[1]: Stopped target local-fs.target - Local File Systems. Jan 16 21:07:00.634110 systemd[1]: Stopped target swap.target - Swaps. Jan 16 21:07:00.635104 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 16 21:07:00.635387 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jan 16 21:07:00.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.637233 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jan 16 21:07:00.638666 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 16 21:07:00.639455 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Jan 16 21:07:00.639618 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 16 21:07:00.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.640602 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 16 21:07:00.640900 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jan 16 21:07:00.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.642202 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jan 16 21:07:00.642476 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Jan 16 21:07:00.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.643697 systemd[1]: ignition-files.service: Deactivated successfully. Jan 16 21:07:00.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.643984 systemd[1]: Stopped ignition-files.service - Ignition (files). Jan 16 21:07:00.645402 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jan 16 21:07:00.645682 systemd[1]: Stopped flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent. Jan 16 21:07:00.649298 systemd[1]: Stopping ignition-mount.service - Ignition (mount)... Jan 16 21:07:00.650015 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 16 21:07:00.651191 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jan 16 21:07:00.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.655266 systemd[1]: Stopping sysroot-boot.service - /sysroot/boot... Jan 16 21:07:00.656371 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 16 21:07:00.658364 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 16 21:07:00.659746 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 16 21:07:00.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.659895 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jan 16 21:07:00.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.661810 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 16 21:07:00.661942 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jan 16 21:07:00.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.672629 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 16 21:07:00.673447 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jan 16 21:07:00.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.694495 ignition[1073]: INFO : Ignition 2.24.0 Jan 16 21:07:00.695401 ignition[1073]: INFO : Stage: umount Jan 16 21:07:00.697043 ignition[1073]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 16 21:07:00.697043 ignition[1073]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jan 16 21:07:00.698917 ignition[1073]: INFO : umount: umount passed Jan 16 21:07:00.698917 ignition[1073]: INFO : Ignition finished successfully Jan 16 21:07:00.701773 systemd[1]: ignition-mount.service: Deactivated successfully. Jan 16 21:07:00.702608 systemd[1]: Stopped ignition-mount.service - Ignition (mount). Jan 16 21:07:00.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.704204 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 16 21:07:00.704883 systemd[1]: Stopped ignition-disks.service - Ignition (disks). Jan 16 21:07:00.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.705939 systemd[1]: ignition-kargs.service: Deactivated successfully. Jan 16 21:07:00.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.706096 systemd[1]: Stopped ignition-kargs.service - Ignition (kargs). Jan 16 21:07:00.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.707367 systemd[1]: ignition-fetch.service: Deactivated successfully. Jan 16 21:07:00.707430 systemd[1]: Stopped ignition-fetch.service - Ignition (fetch). Jan 16 21:07:00.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.708577 systemd[1]: Stopped target network.target - Network. Jan 16 21:07:00.709684 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jan 16 21:07:00.709752 systemd[1]: Stopped ignition-fetch-offline.service - Ignition (fetch-offline). Jan 16 21:07:00.710890 systemd[1]: Stopped target paths.target - Path Units. Jan 16 21:07:00.714195 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 16 21:07:00.720146 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 16 21:07:00.720763 systemd[1]: Stopped target slices.target - Slice Units. Jan 16 21:07:00.722027 systemd[1]: Stopped target sockets.target - Socket Units. Jan 16 21:07:00.723061 systemd[1]: iscsid.socket: Deactivated successfully. Jan 16 21:07:00.723112 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Jan 16 21:07:00.724019 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 16 21:07:00.724065 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jan 16 21:07:00.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.725063 systemd[1]: systemd-journald-audit.socket: Deactivated successfully. Jan 16 21:07:00.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup-pre comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.725091 systemd[1]: Closed systemd-journald-audit.socket - Journal Audit Socket. Jan 16 21:07:00.726323 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 16 21:07:00.726391 systemd[1]: Stopped ignition-setup.service - Ignition (setup). Jan 16 21:07:00.727347 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Jan 16 21:07:00.727398 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Jan 16 21:07:00.728472 systemd[1]: Stopping systemd-networkd.service - Network Configuration... Jan 16 21:07:00.729627 systemd[1]: Stopping systemd-resolved.service - Network Name Resolution... Jan 16 21:07:00.733504 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 16 21:07:00.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.735861 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 16 21:07:00.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.735984 systemd[1]: Stopped systemd-resolved.service - Network Name Resolution. Jan 16 21:07:00.737591 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 16 21:07:00.737680 systemd[1]: Stopped sysroot-boot.service - /sysroot/boot. Jan 16 21:07:00.741959 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 16 21:07:00.741000 audit: BPF prog-id=6 op=UNLOAD Jan 16 21:07:00.742365 systemd[1]: Stopped systemd-networkd.service - Network Configuration. Jan 16 21:07:00.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.744971 systemd[1]: Stopped target network-pre.target - Preparation for Network. Jan 16 21:07:00.744000 audit: BPF prog-id=9 op=UNLOAD Jan 16 21:07:00.745598 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 16 21:07:00.745664 systemd[1]: Closed systemd-networkd.socket - Network Service Netlink Socket. Jan 16 21:07:00.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.746925 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 16 21:07:00.747001 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Jan 16 21:07:00.749182 systemd[1]: Stopping network-cleanup.service - Network Cleanup... Jan 16 21:07:00.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.751277 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jan 16 21:07:00.751356 systemd[1]: Stopped parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jan 16 21:07:00.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.753566 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 16 21:07:00.753699 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jan 16 21:07:00.754399 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 16 21:07:00.754477 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jan 16 21:07:00.757173 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 16 21:07:00.777356 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 16 21:07:00.777595 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 16 21:07:00.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.781354 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 16 21:07:00.782199 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jan 16 21:07:00.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.782828 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 16 21:07:00.782881 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jan 16 21:07:00.784877 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 16 21:07:00.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.784981 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jan 16 21:07:00.785544 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 16 21:07:00.785591 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jan 16 21:07:00.788192 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 16 21:07:00.788247 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 16 21:07:00.791507 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jan 16 21:07:00.793714 systemd[1]: systemd-network-generator.service: Deactivated successfully. Jan 16 21:07:00.793797 systemd[1]: Stopped systemd-network-generator.service - Generate network units from Kernel command line. Jan 16 21:07:00.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.795614 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 16 21:07:00.795681 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 16 21:07:00.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.797257 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 16 21:07:00.797318 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:07:00.798856 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 16 21:07:00.806392 systemd[1]: Stopped network-cleanup.service - Network Cleanup. Jan 16 21:07:00.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.818707 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 16 21:07:00.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:00.819556 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jan 16 21:07:00.821004 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jan 16 21:07:00.823056 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jan 16 21:07:00.857206 systemd[1]: Switching root. Jan 16 21:07:00.894492 systemd-journald[300]: Journal stopped Jan 16 21:07:02.450418 systemd-journald[300]: Received SIGTERM from PID 1 (systemd). Jan 16 21:07:02.450580 kernel: SELinux: policy capability network_peer_controls=1 Jan 16 21:07:02.450625 kernel: SELinux: policy capability open_perms=1 Jan 16 21:07:02.450651 kernel: SELinux: policy capability extended_socket_class=1 Jan 16 21:07:02.450696 kernel: SELinux: policy capability always_check_network=0 Jan 16 21:07:02.450718 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 16 21:07:02.450737 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 16 21:07:02.450757 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 16 21:07:02.450775 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jan 16 21:07:02.450793 kernel: SELinux: policy capability userspace_initial_context=0 Jan 16 21:07:02.450825 systemd[1]: Successfully loaded SELinux policy in 82.524ms. Jan 16 21:07:02.450869 systemd[1]: Relabeled /dev/, /dev/shm/, /run/ in 8.200ms. Jan 16 21:07:02.450910 systemd[1]: systemd 257.9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +IPE +SMACK +SECCOMP -GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBCRYPTSETUP_PLUGINS +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -BTF -XKBCOMMON +UTMP -SYSVINIT +LIBARCHIVE) Jan 16 21:07:02.450933 systemd[1]: Detected virtualization kvm. Jan 16 21:07:02.455946 systemd[1]: Detected architecture x86-64. Jan 16 21:07:02.456064 systemd[1]: Detected first boot. Jan 16 21:07:02.456090 systemd[1]: Hostname set to . Jan 16 21:07:02.456118 systemd[1]: Initializing machine ID from SMBIOS/DMI UUID. Jan 16 21:07:02.456141 zram_generator::config[1118]: No configuration found. Jan 16 21:07:02.456168 kernel: Guest personality initialized and is inactive Jan 16 21:07:02.456189 kernel: VMCI host device registered (name=vmci, major=10, minor=258) Jan 16 21:07:02.456221 kernel: Initialized host personality Jan 16 21:07:02.456243 kernel: NET: Registered PF_VSOCK protocol family Jan 16 21:07:02.456264 systemd[1]: Populated /etc with preset unit settings. Jan 16 21:07:02.456285 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 16 21:07:02.456307 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jan 16 21:07:02.456327 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 16 21:07:02.456361 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Jan 16 21:07:02.456403 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Jan 16 21:07:02.456427 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jan 16 21:07:02.456449 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jan 16 21:07:02.456469 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jan 16 21:07:02.456491 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Jan 16 21:07:02.456516 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jan 16 21:07:02.456541 systemd[1]: Created slice user.slice - User and Session Slice. Jan 16 21:07:02.456593 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 16 21:07:02.456621 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 16 21:07:02.456641 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jan 16 21:07:02.456660 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Jan 16 21:07:02.456697 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jan 16 21:07:02.456720 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Jan 16 21:07:02.456759 systemd[1]: Expecting device dev-ttyS0.device - /dev/ttyS0... Jan 16 21:07:02.456779 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 16 21:07:02.456801 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jan 16 21:07:02.456820 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jan 16 21:07:02.456843 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jan 16 21:07:02.456864 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jan 16 21:07:02.456895 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jan 16 21:07:02.456918 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 16 21:07:02.456940 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jan 16 21:07:02.467136 systemd[1]: Reached target remote-veritysetup.target - Remote Verity Protected Volumes. Jan 16 21:07:02.467200 systemd[1]: Reached target slices.target - Slice Units. Jan 16 21:07:02.467225 systemd[1]: Reached target swap.target - Swaps. Jan 16 21:07:02.467248 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jan 16 21:07:02.467270 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jan 16 21:07:02.467316 systemd[1]: Listening on systemd-creds.socket - Credential Encryption/Decryption. Jan 16 21:07:02.467342 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Jan 16 21:07:02.467363 systemd[1]: Listening on systemd-mountfsd.socket - DDI File System Mounter Socket. Jan 16 21:07:02.467383 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jan 16 21:07:02.467404 systemd[1]: Listening on systemd-nsresourced.socket - Namespace Resource Manager Socket. Jan 16 21:07:02.467460 systemd[1]: Listening on systemd-oomd.socket - Userspace Out-Of-Memory (OOM) Killer Socket. Jan 16 21:07:02.467484 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jan 16 21:07:02.467520 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jan 16 21:07:02.467543 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jan 16 21:07:02.467566 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Jan 16 21:07:02.467587 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jan 16 21:07:02.467608 systemd[1]: Mounting media.mount - External Media Directory... Jan 16 21:07:02.467631 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:02.467652 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jan 16 21:07:02.467684 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jan 16 21:07:02.467706 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jan 16 21:07:02.467729 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jan 16 21:07:02.467752 systemd[1]: Reached target machines.target - Containers. Jan 16 21:07:02.467773 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Jan 16 21:07:02.467794 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 16 21:07:02.467825 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jan 16 21:07:02.467846 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jan 16 21:07:02.467867 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jan 16 21:07:02.467889 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jan 16 21:07:02.467909 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 16 21:07:02.467930 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jan 16 21:07:02.467980 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 16 21:07:02.468021 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jan 16 21:07:02.468044 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 16 21:07:02.468065 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Jan 16 21:07:02.468098 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 16 21:07:02.468130 systemd[1]: Stopped systemd-fsck-usr.service. Jan 16 21:07:02.468155 systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). Jan 16 21:07:02.468175 systemd[1]: Starting systemd-journald.service - Journal Service... Jan 16 21:07:02.468196 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jan 16 21:07:02.468218 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jan 16 21:07:02.468239 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jan 16 21:07:02.468261 systemd[1]: Starting systemd-udev-load-credentials.service - Load udev Rules from Credentials... Jan 16 21:07:02.468297 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jan 16 21:07:02.468320 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:02.468341 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Jan 16 21:07:02.468364 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jan 16 21:07:02.468403 systemd[1]: Mounted media.mount - External Media Directory. Jan 16 21:07:02.468424 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jan 16 21:07:02.468445 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jan 16 21:07:02.468465 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jan 16 21:07:02.468486 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jan 16 21:07:02.468507 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 16 21:07:02.468528 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jan 16 21:07:02.468560 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jan 16 21:07:02.468583 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jan 16 21:07:02.468604 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 16 21:07:02.468627 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 16 21:07:02.468650 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 16 21:07:02.468686 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 16 21:07:02.468710 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jan 16 21:07:02.468747 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jan 16 21:07:02.468769 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jan 16 21:07:02.468797 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jan 16 21:07:02.468819 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jan 16 21:07:02.468840 kernel: fuse: init (API version 7.41) Jan 16 21:07:02.468864 systemd[1]: Listening on systemd-importd.socket - Disk Image Download Service Socket. Jan 16 21:07:02.468914 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jan 16 21:07:02.479086 systemd[1]: Reached target local-fs.target - Local File Systems. Jan 16 21:07:02.479219 systemd[1]: Listening on systemd-sysext.socket - System Extension Image Management. Jan 16 21:07:02.479245 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 16 21:07:02.479270 systemd[1]: systemd-confext.service - Merge System Configuration Images into /etc/ was skipped because no trigger condition checks were met. Jan 16 21:07:02.479304 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Jan 16 21:07:02.479327 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 16 21:07:02.479349 systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed... Jan 16 21:07:02.479370 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Jan 16 21:07:02.479392 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jan 16 21:07:02.479414 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jan 16 21:07:02.479435 systemd[1]: Reached target network-pre.target - Preparation for Network. Jan 16 21:07:02.479466 systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed. Jan 16 21:07:02.479488 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Jan 16 21:07:02.479509 systemd[1]: Starting systemd-machine-id-commit.service - Save Transient machine-id to Disk... Jan 16 21:07:02.479596 systemd-journald[1187]: Collecting audit messages is enabled. Jan 16 21:07:02.479653 systemd[1]: Finished systemd-udev-load-credentials.service - Load udev Rules from Credentials. Jan 16 21:07:02.479675 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jan 16 21:07:02.479712 systemd-journald[1187]: Journal started Jan 16 21:07:02.479751 systemd-journald[1187]: Runtime Journal (/run/log/journal/88d416ebbba7433ba143a63d0c5a9e9e) is 4.8M, max 39.1M, 34.2M free. Jan 16 21:07:02.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.482123 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 16 21:07:02.482199 kernel: ACPI: bus type drm_connector registered Jan 16 21:07:02.482230 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jan 16 21:07:02.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.137000 audit: BPF prog-id=14 op=UNLOAD Jan 16 21:07:02.137000 audit: BPF prog-id=13 op=UNLOAD Jan 16 21:07:02.139000 audit: BPF prog-id=15 op=LOAD Jan 16 21:07:02.139000 audit: BPF prog-id=16 op=LOAD Jan 16 21:07:02.139000 audit: BPF prog-id=17 op=LOAD Jan 16 21:07:02.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.491232 kernel: loop1: detected capacity change from 0 to 50784 Jan 16 21:07:02.491283 systemd[1]: Started systemd-journald.service - Journal Service. Jan 16 21:07:02.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.433000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 16 21:07:02.433000 audit[1187]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffffe736f50 a2=4000 a3=0 items=0 ppid=1 pid=1187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:02.433000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jan 16 21:07:02.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-load-credentials comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:01.874853 systemd[1]: Queued start job for default target multi-user.target. Jan 16 21:07:01.889472 systemd[1]: Unnecessary job was removed for dev-vda6.device - /dev/vda6. Jan 16 21:07:01.890337 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 16 21:07:02.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.490797 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 16 21:07:02.492229 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jan 16 21:07:02.497544 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jan 16 21:07:02.507283 systemd[1]: Finished systemd-machine-id-commit.service - Save Transient machine-id to Disk. Jan 16 21:07:02.558083 kernel: loop2: detected capacity change from 0 to 111560 Jan 16 21:07:02.561157 systemd-journald[1187]: Time spent on flushing to /var/log/journal/88d416ebbba7433ba143a63d0c5a9e9e is 40.299ms for 1118 entries. Jan 16 21:07:02.561157 systemd-journald[1187]: System Journal (/var/log/journal/88d416ebbba7433ba143a63d0c5a9e9e) is 8M, max 163.5M, 155.5M free. Jan 16 21:07:02.610421 systemd-journald[1187]: Received client request to flush runtime journal. Jan 16 21:07:02.610483 kernel: loop3: detected capacity change from 0 to 8 Jan 16 21:07:02.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.588602 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jan 16 21:07:02.591173 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Jan 16 21:07:02.595434 systemd[1]: Starting systemd-sysusers.service - Create System Users... Jan 16 21:07:02.613700 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jan 16 21:07:02.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.630003 kernel: loop4: detected capacity change from 0 to 50784 Jan 16 21:07:02.647005 kernel: loop5: detected capacity change from 0 to 111560 Jan 16 21:07:02.656145 systemd[1]: Finished systemd-sysusers.service - Create System Users. Jan 16 21:07:02.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.658000 audit: BPF prog-id=18 op=LOAD Jan 16 21:07:02.658000 audit: BPF prog-id=19 op=LOAD Jan 16 21:07:02.658000 audit: BPF prog-id=20 op=LOAD Jan 16 21:07:02.663000 audit: BPF prog-id=21 op=LOAD Jan 16 21:07:02.662214 systemd[1]: Starting systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer... Jan 16 21:07:02.667015 kernel: loop6: detected capacity change from 0 to 8 Jan 16 21:07:02.666555 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jan 16 21:07:02.671468 (sd-merge)[1261]: Using extensions 'containerd-flatcar.raw', 'docker-flatcar.raw', 'oem-digitalocean.raw'. Jan 16 21:07:02.673333 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jan 16 21:07:02.682376 (sd-merge)[1261]: Merged extensions into '/usr'. Jan 16 21:07:02.691000 audit: BPF prog-id=22 op=LOAD Jan 16 21:07:02.691000 audit: BPF prog-id=23 op=LOAD Jan 16 21:07:02.691000 audit: BPF prog-id=24 op=LOAD Jan 16 21:07:02.694224 systemd[1]: Starting systemd-nsresourced.service - Namespace Resource Manager... Jan 16 21:07:02.696000 audit: BPF prog-id=25 op=LOAD Jan 16 21:07:02.696000 audit: BPF prog-id=26 op=LOAD Jan 16 21:07:02.696000 audit: BPF prog-id=27 op=LOAD Jan 16 21:07:02.701266 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jan 16 21:07:02.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.705042 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Jan 16 21:07:02.711187 systemd[1]: Starting ensure-sysext.service... Jan 16 21:07:02.716355 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Jan 16 21:07:02.750989 systemd-tmpfiles[1265]: ACLs are not supported, ignoring. Jan 16 21:07:02.751010 systemd-tmpfiles[1265]: ACLs are not supported, ignoring. Jan 16 21:07:02.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:02.769029 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 16 21:07:02.773679 systemd[1]: Reload requested from client PID 1270 ('systemctl') (unit ensure-sysext.service)... Jan 16 21:07:02.773710 systemd[1]: Reloading... Jan 16 21:07:02.846884 systemd-tmpfiles[1271]: /usr/lib/tmpfiles.d/nfs-utils.conf:6: Duplicate line for path "/var/lib/nfs/sm", ignoring. Jan 16 21:07:02.846942 systemd-tmpfiles[1271]: /usr/lib/tmpfiles.d/nfs-utils.conf:7: Duplicate line for path "/var/lib/nfs/sm.bak", ignoring. Jan 16 21:07:02.847442 systemd-tmpfiles[1271]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jan 16 21:07:02.852647 systemd-tmpfiles[1271]: ACLs are not supported, ignoring. Jan 16 21:07:02.852772 systemd-tmpfiles[1271]: ACLs are not supported, ignoring. Jan 16 21:07:02.876924 systemd-tmpfiles[1271]: Detected autofs mount point /boot during canonicalization of boot. Jan 16 21:07:02.877201 systemd-tmpfiles[1271]: Skipping /boot Jan 16 21:07:02.900564 systemd-tmpfiles[1271]: Detected autofs mount point /boot during canonicalization of boot. Jan 16 21:07:02.903013 systemd-tmpfiles[1271]: Skipping /boot Jan 16 21:07:02.926191 systemd-nsresourced[1266]: Not setting up BPF subsystem, as functionality has been disabled at compile time. Jan 16 21:07:03.003468 zram_generator::config[1316]: No configuration found. Jan 16 21:07:03.184709 systemd-resolved[1264]: Positive Trust Anchors: Jan 16 21:07:03.184730 systemd-resolved[1264]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 16 21:07:03.184735 systemd-resolved[1264]: . IN DS 38696 8 2 683d2d0acb8c9b712a1948b27f741219298d0a450d612c483af444a4c0fb2b16 Jan 16 21:07:03.184773 systemd-resolved[1264]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa resolver.arpa corp home internal intranet lan local private test Jan 16 21:07:03.188036 systemd-oomd[1263]: No swap; memory pressure usage will be degraded Jan 16 21:07:03.206267 systemd-resolved[1264]: Using system hostname 'ci-4580.0.0-p-6168a244cc'. Jan 16 21:07:03.401815 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 16 21:07:03.402346 systemd[1]: Reloading finished in 627 ms. Jan 16 21:07:03.418553 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jan 16 21:07:03.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.419922 systemd[1]: Started systemd-nsresourced.service - Namespace Resource Manager. Jan 16 21:07:03.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-nsresourced comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.421146 systemd[1]: Started systemd-oomd.service - Userspace Out-Of-Memory (OOM) Killer. Jan 16 21:07:03.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-oomd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.422269 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jan 16 21:07:03.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.430000 audit: BPF prog-id=28 op=LOAD Jan 16 21:07:03.431000 audit: BPF prog-id=22 op=UNLOAD Jan 16 21:07:03.431000 audit: BPF prog-id=29 op=LOAD Jan 16 21:07:03.431000 audit: BPF prog-id=30 op=LOAD Jan 16 21:07:03.431000 audit: BPF prog-id=23 op=UNLOAD Jan 16 21:07:03.431000 audit: BPF prog-id=24 op=UNLOAD Jan 16 21:07:03.432000 audit: BPF prog-id=31 op=LOAD Jan 16 21:07:03.432000 audit: BPF prog-id=25 op=UNLOAD Jan 16 21:07:03.432000 audit: BPF prog-id=32 op=LOAD Jan 16 21:07:03.432000 audit: BPF prog-id=33 op=LOAD Jan 16 21:07:03.432000 audit: BPF prog-id=26 op=UNLOAD Jan 16 21:07:03.432000 audit: BPF prog-id=27 op=UNLOAD Jan 16 21:07:03.436000 audit: BPF prog-id=34 op=LOAD Jan 16 21:07:03.436000 audit: BPF prog-id=15 op=UNLOAD Jan 16 21:07:03.436000 audit: BPF prog-id=35 op=LOAD Jan 16 21:07:03.436000 audit: BPF prog-id=36 op=LOAD Jan 16 21:07:03.436000 audit: BPF prog-id=16 op=UNLOAD Jan 16 21:07:03.436000 audit: BPF prog-id=17 op=UNLOAD Jan 16 21:07:03.438000 audit: BPF prog-id=37 op=LOAD Jan 16 21:07:03.438000 audit: BPF prog-id=18 op=UNLOAD Jan 16 21:07:03.438000 audit: BPF prog-id=38 op=LOAD Jan 16 21:07:03.438000 audit: BPF prog-id=39 op=LOAD Jan 16 21:07:03.438000 audit: BPF prog-id=19 op=UNLOAD Jan 16 21:07:03.438000 audit: BPF prog-id=20 op=UNLOAD Jan 16 21:07:03.440000 audit: BPF prog-id=40 op=LOAD Jan 16 21:07:03.440000 audit: BPF prog-id=21 op=UNLOAD Jan 16 21:07:03.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.449351 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 16 21:07:03.460526 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jan 16 21:07:03.471308 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jan 16 21:07:03.475932 systemd[1]: Starting audit-rules.service - Load Audit Rules... Jan 16 21:07:03.480291 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Jan 16 21:07:03.491434 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Jan 16 21:07:03.504342 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Jan 16 21:07:03.512862 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jan 16 21:07:03.517498 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jan 16 21:07:03.533431 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.533665 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 16 21:07:03.542712 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jan 16 21:07:03.547758 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 16 21:07:03.564542 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 16 21:07:03.565000 audit[1365]: SYSTEM_BOOT pid=1365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.566238 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 16 21:07:03.566573 systemd[1]: systemd-confext.service - Merge System Configuration Images into /etc/ was skipped because no trigger condition checks were met. Jan 16 21:07:03.566705 systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). Jan 16 21:07:03.566827 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.578846 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Jan 16 21:07:03.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.588011 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.588728 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 16 21:07:03.589730 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 16 21:07:03.595225 systemd[1]: systemd-confext.service - Merge System Configuration Images into /etc/ was skipped because no trigger condition checks were met. Jan 16 21:07:03.595533 systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). Jan 16 21:07:03.595731 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.599725 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 16 21:07:03.600428 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 16 21:07:03.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.609632 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jan 16 21:07:03.611477 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 16 21:07:03.612162 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 16 21:07:03.630281 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jan 16 21:07:03.631584 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jan 16 21:07:03.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.641832 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.644262 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 16 21:07:03.647378 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jan 16 21:07:03.652337 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 16 21:07:03.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.661598 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 16 21:07:03.662526 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 16 21:07:03.662710 systemd[1]: systemd-confext.service - Merge System Configuration Images into /etc/ was skipped because no trigger condition checks were met. Jan 16 21:07:03.662763 systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). Jan 16 21:07:03.662871 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:03.664525 systemd[1]: Finished ensure-sysext.service. Jan 16 21:07:03.680000 audit: BPF prog-id=41 op=LOAD Jan 16 21:07:03.697450 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Jan 16 21:07:03.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.704865 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 16 21:07:03.708574 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 16 21:07:03.710501 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 16 21:07:03.710793 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 16 21:07:03.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.725457 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 16 21:07:03.725579 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jan 16 21:07:03.741714 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 16 21:07:03.742051 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jan 16 21:07:03.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.785932 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Jan 16 21:07:03.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:03.788099 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jan 16 21:07:03.812000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 16 21:07:03.812000 audit[1407]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffab3694c0 a2=420 a3=0 items=0 ppid=1361 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/bin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:03.812000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jan 16 21:07:03.815167 augenrules[1407]: No rules Jan 16 21:07:03.818711 systemd[1]: audit-rules.service: Deactivated successfully. Jan 16 21:07:03.820389 systemd[1]: Finished audit-rules.service - Load Audit Rules. Jan 16 21:07:03.904774 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Jan 16 21:07:03.908167 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 16 21:07:03.931560 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Jan 16 21:07:03.932871 systemd[1]: Reached target time-set.target - System Time Set. Jan 16 21:07:03.967310 systemd-udevd[1414]: Using default interface naming scheme 'v257'. Jan 16 21:07:04.011914 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 16 21:07:04.017629 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jan 16 21:07:04.153178 systemd-networkd[1419]: lo: Link UP Jan 16 21:07:04.153851 systemd-networkd[1419]: lo: Gained carrier Jan 16 21:07:04.164038 systemd[1]: Started systemd-networkd.service - Network Configuration. Jan 16 21:07:04.170309 systemd[1]: Reached target network.target - Network. Jan 16 21:07:04.181487 systemd[1]: Starting systemd-networkd-persistent-storage.service - Enable Persistent Storage in systemd-networkd... Jan 16 21:07:04.186210 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Jan 16 21:07:04.256462 systemd[1]: Condition check resulted in dev-disk-by\x2dlabel-config\x2d2.device - /dev/disk/by-label/config-2 being skipped. Jan 16 21:07:04.258057 systemd[1]: Mounting media-configdrive.mount - /media/configdrive... Jan 16 21:07:04.259016 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:04.259168 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 16 21:07:04.260485 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jan 16 21:07:04.269356 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 16 21:07:04.274130 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 16 21:07:04.274780 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 16 21:07:04.274907 systemd[1]: systemd-confext.service - Merge System Configuration Images into /etc/ was skipped because no trigger condition checks were met. Jan 16 21:07:04.274942 systemd[1]: systemd-hibernate-clear.service - Clear Stale Hibernate Storage Info was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/HibernateLocation-8cf2644b-4b0b-428f-9387-6d876050dc67). Jan 16 21:07:04.276027 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jan 16 21:07:04.276062 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 16 21:07:04.309438 systemd[1]: Finished systemd-networkd-persistent-storage.service - Enable Persistent Storage in systemd-networkd. Jan 16 21:07:04.313092 systemd[1]: Condition check resulted in dev-ttyS0.device - /dev/ttyS0 being skipped. Jan 16 21:07:04.326986 kernel: ISO 9660 Extensions: RRIP_1991A Jan 16 21:07:04.329742 systemd[1]: Mounted media-configdrive.mount - /media/configdrive. Jan 16 21:07:04.343489 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jan 16 21:07:04.346238 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jan 16 21:07:04.362205 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 16 21:07:04.364070 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 16 21:07:04.365152 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 16 21:07:04.366165 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 16 21:07:04.369063 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 16 21:07:04.369119 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jan 16 21:07:04.447356 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM. Jan 16 21:07:04.454201 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Jan 16 21:07:04.506339 systemd-networkd[1419]: eth0: Configuring with /run/systemd/network/10-62:47:10:a3:30:f4.network. Jan 16 21:07:04.510022 systemd-networkd[1419]: eth0: Link UP Jan 16 21:07:04.510298 systemd-networkd[1419]: eth0: Gained carrier Jan 16 21:07:04.514909 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Jan 16 21:07:04.521364 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:04.532884 systemd-networkd[1419]: eth1: Configuring with /run/systemd/network/10-02:0b:19:3b:a4:bc.network. Jan 16 21:07:04.535316 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:04.536117 systemd-networkd[1419]: eth1: Link UP Jan 16 21:07:04.537131 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:04.537544 systemd-networkd[1419]: eth1: Gained carrier Jan 16 21:07:04.538467 ldconfig[1363]: /sbin/ldconfig: /usr/lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jan 16 21:07:04.543491 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:04.544132 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Jan 16 21:07:04.547733 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:04.548277 systemd[1]: Starting systemd-update-done.service - Update is Completed... Jan 16 21:07:04.562998 kernel: mousedev: PS/2 mouse device common for all mice Jan 16 21:07:04.584496 systemd[1]: Finished systemd-update-done.service - Update is Completed. Jan 16 21:07:04.586663 systemd[1]: Reached target sysinit.target - System Initialization. Jan 16 21:07:04.588186 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Jan 16 21:07:04.589424 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 16 21:07:04.590287 systemd[1]: Started google-oslogin-cache.timer - NSS cache refresh timer. Jan 16 21:07:04.591246 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jan 16 21:07:04.591926 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Jan 16 21:07:04.593135 systemd[1]: Started systemd-sysupdate-reboot.timer - Reboot Automatically After System Update. Jan 16 21:07:04.593880 systemd[1]: Started systemd-sysupdate.timer - Automatic System Update. Jan 16 21:07:04.594625 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jan 16 21:07:04.595752 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jan 16 21:07:04.595797 systemd[1]: Reached target paths.target - Path Units. Jan 16 21:07:04.596859 systemd[1]: Reached target timers.target - Timer Units. Jan 16 21:07:04.598103 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 16 21:07:04.600985 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jan 16 21:07:04.604331 systemd[1]: Starting docker.socket - Docker Socket for the API... Jan 16 21:07:04.607514 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 16 21:07:04.611626 systemd[1]: Listening on sshd-unix-local.socket - OpenSSH Server Socket (systemd-ssh-generator, AF_UNIX Local). Jan 16 21:07:04.612616 systemd[1]: Listening on sshd-vsock.socket - OpenSSH Server Socket (systemd-ssh-generator, AF_VSOCK). Jan 16 21:07:04.614135 systemd[1]: Reached target ssh-access.target - SSH Access Available. Jan 16 21:07:04.628186 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Jan 16 21:07:04.629422 systemd[1]: Listening on systemd-hostnamed.socket - Hostname Service Socket. Jan 16 21:07:04.631787 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jan 16 21:07:04.636222 systemd[1]: Reached target sockets.target - Socket Units. Jan 16 21:07:04.637418 systemd[1]: Reached target basic.target - Basic System. Jan 16 21:07:04.638357 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Jan 16 21:07:04.638390 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Jan 16 21:07:04.640942 systemd[1]: Starting containerd.service - containerd container runtime... Jan 16 21:07:04.647317 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Jan 16 21:07:04.651709 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Jan 16 21:07:04.654845 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Jan 16 21:07:04.704259 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Jan 16 21:07:04.721778 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jan 16 21:07:04.718300 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Jan 16 21:07:04.720092 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Jan 16 21:07:04.726801 systemd[1]: Starting google-oslogin-cache.service - NSS cache refresh... Jan 16 21:07:04.734451 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Jan 16 21:07:04.740688 jq[1474]: false Jan 16 21:07:04.745250 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Jan 16 21:07:04.752541 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Jan 16 21:07:04.760089 systemd[1]: Starting systemd-logind.service - User Login Management... Jan 16 21:07:04.761053 systemd[1]: tcsd.service - TCG Core Services Daemon was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jan 16 21:07:04.761901 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 16 21:07:04.765340 systemd[1]: Starting update-engine.service - Update Engine... Jan 16 21:07:04.771332 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Jan 16 21:07:04.785025 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Jan 16 21:07:04.786244 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jan 16 21:07:04.802698 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Jan 16 21:07:04.815183 coreos-metadata[1469]: Jan 16 21:07:04.814 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jan 16 21:07:04.844987 coreos-metadata[1469]: Jan 16 21:07:04.840 INFO Fetch successful Jan 16 21:07:04.850273 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Refreshing passwd entry cache Jan 16 21:07:04.849557 oslogin_cache_refresh[1476]: Refreshing passwd entry cache Jan 16 21:07:04.855237 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 16 21:07:04.855922 jq[1488]: true Jan 16 21:07:04.857123 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Jan 16 21:07:04.884366 oslogin_cache_refresh[1476]: Failure getting users, quitting Jan 16 21:07:04.885506 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Failure getting users, quitting Jan 16 21:07:04.885506 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Produced empty passwd cache file, removing /etc/oslogin_passwd.cache.bak. Jan 16 21:07:04.885506 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Refreshing group entry cache Jan 16 21:07:04.884401 oslogin_cache_refresh[1476]: Produced empty passwd cache file, removing /etc/oslogin_passwd.cache.bak. Jan 16 21:07:04.884499 oslogin_cache_refresh[1476]: Refreshing group entry cache Jan 16 21:07:04.887051 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Failure getting groups, quitting Jan 16 21:07:04.887051 google_oslogin_nss_cache[1476]: oslogin_cache_refresh[1476]: Produced empty group cache file, removing /etc/oslogin_group.cache.bak. Jan 16 21:07:04.885891 oslogin_cache_refresh[1476]: Failure getting groups, quitting Jan 16 21:07:04.885914 oslogin_cache_refresh[1476]: Produced empty group cache file, removing /etc/oslogin_group.cache.bak. Jan 16 21:07:04.897337 extend-filesystems[1475]: Found /dev/vda6 Jan 16 21:07:04.898595 systemd[1]: google-oslogin-cache.service: Deactivated successfully. Jan 16 21:07:04.899178 systemd[1]: Finished google-oslogin-cache.service - NSS cache refresh. Jan 16 21:07:04.928162 jq[1501]: true Jan 16 21:07:04.928587 extend-filesystems[1475]: Found /dev/vda9 Jan 16 21:07:04.946065 update_engine[1486]: I20260116 21:07:04.945693 1486 main.cc:92] Flatcar Update Engine starting Jan 16 21:07:04.958286 extend-filesystems[1475]: Checking size of /dev/vda9 Jan 16 21:07:04.980343 kernel: ACPI: button: Power Button [PWRF] Jan 16 21:07:04.998995 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Jan 16 21:07:05.000102 systemd[1]: packet-phone-home.service - Report Success to Packet was skipped because no trigger condition checks were met. Jan 16 21:07:05.001563 dbus-daemon[1470]: [system] SELinux support is enabled Jan 16 21:07:05.002012 systemd[1]: Started dbus.service - D-Bus System Message Bus. Jan 16 21:07:05.008816 systemd[1]: motdgen.service: Deactivated successfully. Jan 16 21:07:05.009267 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Jan 16 21:07:05.013109 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jan 16 21:07:05.013174 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Jan 16 21:07:05.014416 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jan 16 21:07:05.014543 systemd[1]: user-configdrive.service - Load cloud-config from /media/configdrive was skipped because of an unmet condition check (ConditionKernelCommandLine=!flatcar.oem.id=digitalocean). Jan 16 21:07:05.014573 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Jan 16 21:07:05.043883 extend-filesystems[1475]: Resized partition /dev/vda9 Jan 16 21:07:05.051818 systemd[1]: Started update-engine.service - Update Engine. Jan 16 21:07:05.057420 update_engine[1486]: I20260116 21:07:05.056898 1486 update_check_scheduler.cc:74] Next update check in 9m55s Jan 16 21:07:05.057481 extend-filesystems[1549]: resize2fs 1.47.3 (8-Jul-2025) Jan 16 21:07:05.094592 kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 16 21:07:05.098444 bash[1551]: Updated "/home/core/.ssh/authorized_keys" Jan 16 21:07:05.106848 kernel: EXT4-fs (vda9): resizing filesystem from 456704 to 14138363 blocks Jan 16 21:07:05.110391 systemd[1]: Started locksmithd.service - Cluster reboot manager. Jan 16 21:07:05.111825 systemd[1]: Finished update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition. Jan 16 21:07:05.119402 systemd[1]: Starting sshkeys.service... Jan 16 21:07:05.182705 kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 16 21:07:05.236710 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Jan 16 21:07:05.247806 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Jan 16 21:07:05.267998 kernel: EXT4-fs (vda9): resized filesystem to 14138363 Jan 16 21:07:05.293330 extend-filesystems[1549]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jan 16 21:07:05.293330 extend-filesystems[1549]: old_desc_blocks = 1, new_desc_blocks = 7 Jan 16 21:07:05.293330 extend-filesystems[1549]: The filesystem on /dev/vda9 is now 14138363 (4k) blocks long. Jan 16 21:07:05.323362 kernel: Console: switching to colour dummy device 80x25 Jan 16 21:07:05.323406 kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 16 21:07:05.323432 kernel: [drm] features: -context_init Jan 16 21:07:05.318744 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 16 21:07:05.323582 extend-filesystems[1475]: Resized filesystem in /dev/vda9 Jan 16 21:07:05.319198 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Jan 16 21:07:05.328114 kernel: [drm] number of scanouts: 1 Jan 16 21:07:05.328214 kernel: [drm] number of cap sets: 0 Jan 16 21:07:05.358989 kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Jan 16 21:07:05.364290 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:07:05.480786 systemd-logind[1485]: Watching system buttons on /dev/input/event2 (Power Button) Jan 16 21:07:05.483465 systemd-logind[1485]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 16 21:07:05.485428 systemd-logind[1485]: New seat seat0. Jan 16 21:07:05.491106 systemd[1]: Started systemd-logind.service - User Login Management. Jan 16 21:07:05.508673 kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Jan 16 21:07:05.508782 kernel: Console: switching to colour frame buffer device 128x48 Jan 16 21:07:05.511150 kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 16 21:07:05.528336 coreos-metadata[1554]: Jan 16 21:07:05.526 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jan 16 21:07:05.554812 coreos-metadata[1554]: Jan 16 21:07:05.549 INFO Fetch successful Jan 16 21:07:05.580735 unknown[1554]: wrote ssh authorized keys file for user: core Jan 16 21:07:05.619304 systemd-networkd[1419]: eth1: Gained IPv6LL Jan 16 21:07:05.620800 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:05.626133 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Jan 16 21:07:05.666171 update-ssh-keys[1569]: Updated "/home/core/.ssh/authorized_keys" Jan 16 21:07:05.658088 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Jan 16 21:07:05.672576 systemd[1]: Reached target network-online.target - Network is Online. Jan 16 21:07:05.680058 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jan 16 21:07:05.694228 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Jan 16 21:07:05.699504 systemd[1]: Finished sshkeys.service. Jan 16 21:07:05.707643 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 16 21:07:05.708474 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:07:05.711222 (-wrapper)[1573]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS Jan 16 21:07:05.771346 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:07:05.805917 containerd[1506]: time="2026-01-16T21:07:05Z" level=warning msg="Ignoring unknown key in TOML" column=1 error="strict mode: fields in the document are missing in the target struct" file=/usr/share/containerd/config.toml key=subreaper row=8 Jan 16 21:07:05.814039 containerd[1506]: time="2026-01-16T21:07:05.813457315Z" level=info msg="starting containerd" revision=fcd43222d6b07379a4be9786bda52438f0dd16a1 version=v2.1.5 Jan 16 21:07:05.838458 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Jan 16 21:07:05.891660 containerd[1506]: time="2026-01-16T21:07:05.891547049Z" level=warning msg="Configuration migrated from version 2, use `containerd config migrate` to avoid migration" t="12.987µs" Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896006352Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896113392Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896129001Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896320168Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896339854Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896396193Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Jan 16 21:07:05.896513 containerd[1506]: time="2026-01-16T21:07:05.896408134Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.btrfs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.908368 containerd[1506]: time="2026-01-16T21:07:05.908314939Z" level=info msg="skip loading plugin" error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" id=io.containerd.snapshotter.v1.btrfs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.908988 containerd[1506]: time="2026-01-16T21:07:05.908534285Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 Jan 16 21:07:05.908988 containerd[1506]: time="2026-01-16T21:07:05.908567866Z" level=info msg="skip loading plugin" error="devmapper not configured: skip plugin" id=io.containerd.snapshotter.v1.devmapper type=io.containerd.snapshotter.v1 Jan 16 21:07:05.908988 containerd[1506]: time="2026-01-16T21:07:05.908577358Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.908988 containerd[1506]: time="2026-01-16T21:07:05.908924901Z" level=info msg="skip loading plugin" error="EROFS unsupported, please `modprobe erofs`: skip plugin" id=io.containerd.snapshotter.v1.erofs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.909239 containerd[1506]: time="2026-01-16T21:07:05.909207746Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 Jan 16 21:07:05.913028 containerd[1506]: time="2026-01-16T21:07:05.912137471Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.915985 containerd[1506]: time="2026-01-16T21:07:05.913217088Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.916788 containerd[1506]: time="2026-01-16T21:07:05.916492633Z" level=info msg="skip loading plugin" error="lstat /var/lib/containerd/io.containerd.snapshotter.v1.zfs: no such file or directory: skip plugin" id=io.containerd.snapshotter.v1.zfs type=io.containerd.snapshotter.v1 Jan 16 21:07:05.916788 containerd[1506]: time="2026-01-16T21:07:05.916569826Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 Jan 16 21:07:05.916788 containerd[1506]: time="2026-01-16T21:07:05.916687020Z" level=info msg="loading plugin" id=io.containerd.monitor.task.v1.cgroups type=io.containerd.monitor.task.v1 Jan 16 21:07:05.921229 containerd[1506]: time="2026-01-16T21:07:05.921030099Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 Jan 16 21:07:05.924245 containerd[1506]: time="2026-01-16T21:07:05.923089371Z" level=info msg="metadata content store policy set" policy=shared Jan 16 21:07:05.934536 containerd[1506]: time="2026-01-16T21:07:05.934437154Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934685160Z" level=info msg="loading plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934802033Z" level=info msg="skip loading plugin" error="could not find mkfs.erofs: exec: \"mkfs.erofs\": executable file not found in $PATH: skip plugin" id=io.containerd.differ.v1.erofs type=io.containerd.differ.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934817181Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934844673Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934871152Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934886853Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934898468Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934911459Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934924852Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 Jan 16 21:07:05.934972 containerd[1506]: time="2026-01-16T21:07:05.934941136Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935715368Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935744626Z" level=info msg="loading plugin" id=io.containerd.shim.v1.manager type=io.containerd.shim.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935759848Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935924454Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935964001Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.935987702Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936000693Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936024603Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936038367Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936052119Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936063308Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936106464Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936120382Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936132432Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 Jan 16 21:07:05.936983 containerd[1506]: time="2026-01-16T21:07:05.936163978Z" level=info msg="loading plugin" id=io.containerd.cri.v1.images type=io.containerd.cri.v1 Jan 16 21:07:05.937352 containerd[1506]: time="2026-01-16T21:07:05.936210596Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" Jan 16 21:07:05.937352 containerd[1506]: time="2026-01-16T21:07:05.936226669Z" level=info msg="Start snapshots syncer" Jan 16 21:07:05.937352 containerd[1506]: time="2026-01-16T21:07:05.936263696Z" level=info msg="loading plugin" id=io.containerd.cri.v1.runtime type=io.containerd.cri.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936559118Z" level=info msg="starting cri plugin" config="{\"containerd\":{\"defaultRuntimeName\":\"runc\",\"runtimes\":{\"runc\":{\"runtimeType\":\"io.containerd.runc.v2\",\"runtimePath\":\"\",\"PodAnnotations\":null,\"ContainerAnnotations\":null,\"options\":{\"BinaryName\":\"\",\"CriuImagePath\":\"\",\"CriuWorkPath\":\"\",\"IoGid\":0,\"IoUid\":0,\"NoNewKeyring\":false,\"Root\":\"\",\"ShimCgroup\":\"\",\"SystemdCgroup\":true},\"privileged_without_host_devices\":false,\"privileged_without_host_devices_all_devices_allowed\":false,\"cgroupWritable\":false,\"baseRuntimeSpec\":\"\",\"cniConfDir\":\"\",\"cniMaxConfNum\":0,\"snapshotter\":\"\",\"sandboxer\":\"podsandbox\",\"io_type\":\"\"}},\"ignoreBlockIONotEnabledErrors\":false,\"ignoreRdtNotEnabledErrors\":false},\"cni\":{\"binDir\":\"\",\"binDirs\":[\"/opt/cni/bin\"],\"confDir\":\"/etc/cni/net.d\",\"maxConfNum\":1,\"setupSerially\":false,\"confTemplate\":\"\",\"ipPref\":\"\",\"useInternalLoopback\":false},\"enableSelinux\":true,\"selinuxCategoryRange\":1024,\"maxContainerLogLineSize\":16384,\"disableApparmor\":false,\"restrictOOMScoreAdj\":false,\"disableProcMount\":false,\"unsetSeccompProfile\":\"\",\"tolerateMissingHugetlbController\":true,\"disableHugetlbController\":true,\"device_ownership_from_security_context\":false,\"ignoreImageDefinedVolumes\":false,\"netnsMountsUnderStateDir\":false,\"enableUnprivilegedPorts\":true,\"enableUnprivilegedICMP\":true,\"enableCDI\":true,\"cdiSpecDirs\":[\"/etc/cdi\",\"/var/run/cdi\"],\"drainExecSyncIOTimeout\":\"0s\",\"ignoreDeprecationWarnings\":null,\"containerdRootDir\":\"/var/lib/containerd\",\"containerdEndpoint\":\"/run/containerd/containerd.sock\",\"rootDir\":\"/var/lib/containerd/io.containerd.grpc.v1.cri\",\"stateDir\":\"/run/containerd/io.containerd.grpc.v1.cri\"}" Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936680247Z" level=info msg="loading plugin" id=io.containerd.podsandbox.controller.v1.podsandbox type=io.containerd.podsandbox.controller.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936745597Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936861206Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936888319Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936899458Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936911119Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936924370Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 Jan 16 21:07:05.937413 containerd[1506]: time="2026-01-16T21:07:05.936939982Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 Jan 16 21:07:05.941985 kernel: EDAC MC: Ver: 3.0.0 Jan 16 21:07:05.945164 containerd[1506]: time="2026-01-16T21:07:05.944911252Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 Jan 16 21:07:05.945164 containerd[1506]: time="2026-01-16T21:07:05.944975786Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 Jan 16 21:07:05.945164 containerd[1506]: time="2026-01-16T21:07:05.944994298Z" level=info msg="loading plugin" id=io.containerd.monitor.container.v1.restart type=io.containerd.monitor.container.v1 Jan 16 21:07:05.945164 containerd[1506]: time="2026-01-16T21:07:05.945077902Z" level=info msg="loading plugin" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945372108Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.tracing.processor.v1.otlp type=io.containerd.tracing.processor.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945391270Z" level=info msg="loading plugin" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945404712Z" level=info msg="skip loading plugin" error="skip plugin: tracing endpoint not configured" id=io.containerd.internal.v1.tracing type=io.containerd.internal.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945413618Z" level=info msg="loading plugin" id=io.containerd.ttrpc.v1.otelttrpc type=io.containerd.ttrpc.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945423324Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945438859Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945459194Z" level=info msg="runtime interface created" Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945466930Z" level=info msg="created NRI interface" Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945479650Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.cri type=io.containerd.grpc.v1 Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945503510Z" level=info msg="Connect containerd service" Jan 16 21:07:05.947510 containerd[1506]: time="2026-01-16T21:07:05.945537315Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Jan 16 21:07:05.957022 containerd[1506]: time="2026-01-16T21:07:05.956619756Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jan 16 21:07:06.039998 sshd_keygen[1515]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jan 16 21:07:06.095187 locksmithd[1550]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 16 21:07:06.131651 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Jan 16 21:07:06.146403 systemd[1]: Starting issuegen.service - Generate /run/issue... Jan 16 21:07:06.209073 systemd[1]: issuegen.service: Deactivated successfully. Jan 16 21:07:06.209694 systemd[1]: Finished issuegen.service - Generate /run/issue. Jan 16 21:07:06.217328 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:07:06.236517 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jan 16 21:07:06.236771 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 16 21:07:06.238064 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:07:06.238294 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:07:06.241362 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 16 21:07:06.281771 containerd[1506]: time="2026-01-16T21:07:06.281717608Z" level=info msg="Start subscribing containerd event" Jan 16 21:07:06.282018 containerd[1506]: time="2026-01-16T21:07:06.281936833Z" level=info msg="Start recovering state" Jan 16 21:07:06.282234 containerd[1506]: time="2026-01-16T21:07:06.282212503Z" level=info msg="Start event monitor" Jan 16 21:07:06.283166 containerd[1506]: time="2026-01-16T21:07:06.283043575Z" level=info msg="Start cni network conf syncer for default" Jan 16 21:07:06.283166 containerd[1506]: time="2026-01-16T21:07:06.283091535Z" level=info msg="Start streaming server" Jan 16 21:07:06.283166 containerd[1506]: time="2026-01-16T21:07:06.283107189Z" level=info msg="Registered namespace \"k8s.io\" with NRI" Jan 16 21:07:06.283166 containerd[1506]: time="2026-01-16T21:07:06.283119446Z" level=info msg="runtime interface starting up..." Jan 16 21:07:06.283166 containerd[1506]: time="2026-01-16T21:07:06.283128187Z" level=info msg="starting plugins..." Jan 16 21:07:06.283576 containerd[1506]: time="2026-01-16T21:07:06.283435563Z" level=info msg="Synchronizing NRI (plugin) with current runtime state" Jan 16 21:07:06.286720 containerd[1506]: time="2026-01-16T21:07:06.286250736Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jan 16 21:07:06.286720 containerd[1506]: time="2026-01-16T21:07:06.286335692Z" level=info msg=serving... address=/run/containerd/containerd.sock Jan 16 21:07:06.286720 containerd[1506]: time="2026-01-16T21:07:06.286519515Z" level=info msg="containerd successfully booted in 0.481139s" Jan 16 21:07:06.286819 systemd[1]: Started containerd.service - containerd container runtime. Jan 16 21:07:06.290365 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jan 16 21:07:06.298463 systemd[1]: Starting docker.service - Docker Application Container Engine... Jan 16 21:07:06.306611 systemd[1]: Started getty@tty1.service - Getty on tty1. Jan 16 21:07:06.312361 systemd[1]: Started serial-getty@ttyS0.service - Serial Getty on ttyS0. Jan 16 21:07:06.315194 systemd[1]: Reached target getty.target - Login Prompts. Jan 16 21:07:06.330379 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 16 21:07:06.330988 (dockerd)[1639]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS, DOCKER_OPT_BIP, DOCKER_OPT_IPMASQ, DOCKER_OPT_MTU Jan 16 21:07:06.382143 systemd-networkd[1419]: eth0: Gained IPv6LL Jan 16 21:07:06.390528 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:06.753341 dockerd[1639]: time="2026-01-16T21:07:06.753183711Z" level=info msg="Starting up" Jan 16 21:07:06.755622 dockerd[1639]: time="2026-01-16T21:07:06.755585386Z" level=info msg="OTEL tracing is not configured, using no-op tracer provider" Jan 16 21:07:06.772118 dockerd[1639]: time="2026-01-16T21:07:06.772064924Z" level=info msg="Creating a containerd client" address=/var/run/docker/libcontainerd/docker-containerd.sock timeout=1m0s Jan 16 21:07:06.828024 dockerd[1639]: time="2026-01-16T21:07:06.827725403Z" level=info msg="Loading containers: start." Jan 16 21:07:06.838035 kernel: Initializing XFRM netlink socket Jan 16 21:07:07.067466 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:07.072831 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:07.080701 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:07.117614 systemd-networkd[1419]: docker0: Link UP Jan 16 21:07:07.118035 systemd-timesyncd[1391]: Network configuration changed, trying to establish connection. Jan 16 21:07:07.121210 dockerd[1639]: time="2026-01-16T21:07:07.121116415Z" level=info msg="Loading containers: done." Jan 16 21:07:07.147332 dockerd[1639]: time="2026-01-16T21:07:07.147224179Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jan 16 21:07:07.147837 dockerd[1639]: time="2026-01-16T21:07:07.147693603Z" level=info msg="Docker daemon" commit=6430e49a55babd9b8f4d08e70ecb2b68900770fe containerd-snapshotter=false storage-driver=overlay2 version=28.0.4 Jan 16 21:07:07.148107 dockerd[1639]: time="2026-01-16T21:07:07.148002854Z" level=info msg="Initializing buildkit" Jan 16 21:07:07.175174 dockerd[1639]: time="2026-01-16T21:07:07.175020764Z" level=info msg="Completed buildkit initialization" Jan 16 21:07:07.185075 dockerd[1639]: time="2026-01-16T21:07:07.185020192Z" level=info msg="Daemon has completed initialization" Jan 16 21:07:07.185653 dockerd[1639]: time="2026-01-16T21:07:07.185285059Z" level=info msg="API listen on /run/docker.sock" Jan 16 21:07:07.185473 systemd[1]: Started docker.service - Docker Application Container Engine. Jan 16 21:07:07.188120 etcd-wrapper[1581]: Error response from daemon: No such container: etcd-member Jan 16 21:07:07.208001 etcd-wrapper[1838]: Error response from daemon: No such container: etcd-member Jan 16 21:07:07.252995 etcd-wrapper[1856]: Unable to find image 'quay.io/coreos/etcd:v3.5.22' locally Jan 16 21:07:07.582391 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck696405791-merged.mount: Deactivated successfully. Jan 16 21:07:09.115187 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Jan 16 21:07:09.118003 systemd[1]: Started sshd@0-64.23.236.65:22-68.220.241.50:37602.service - OpenSSH per-connection server daemon (68.220.241.50:37602). Jan 16 21:07:09.291161 etcd-wrapper[1856]: v3.5.22: Pulling from coreos/etcd Jan 16 21:07:09.532539 sshd[1864]: Accepted publickey for core from 68.220.241.50 port 37602 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:09.534795 sshd-session[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:09.543023 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Jan 16 21:07:09.545664 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Jan 16 21:07:09.554026 systemd-logind[1485]: New session 1 of user core. Jan 16 21:07:09.574260 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Jan 16 21:07:09.579906 systemd[1]: Starting user@500.service - User Manager for UID 500... Jan 16 21:07:09.594510 (systemd)[1870]: pam_unix(systemd-user:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:09.598073 systemd-logind[1485]: New session 2 of user core. Jan 16 21:07:09.668385 etcd-wrapper[1856]: f5083dc2076d: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 2ae710cd8bfe: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: d462aa345367: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 0f8b424aa0b9: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: d557676654e5: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: c8022d07192e: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: d858cbc252ad: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 1069fc2daed1: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: b40161cd83fc: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 5318d93a3a65: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 307c1adadb60: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 60a82e1b19c6: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 6f77055ebb6e: Pulling fs layer Jan 16 21:07:09.668385 etcd-wrapper[1856]: 67f98bbc9874: Pulling fs layer Jan 16 21:07:09.669831 etcd-wrapper[1856]: 1069fc2daed1: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: 0f8b424aa0b9: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: d557676654e5: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: c8022d07192e: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: d858cbc252ad: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: b40161cd83fc: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: 5318d93a3a65: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: 307c1adadb60: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: 60a82e1b19c6: Waiting Jan 16 21:07:09.669831 etcd-wrapper[1856]: 6f77055ebb6e: Waiting Jan 16 21:07:09.670435 etcd-wrapper[1856]: 67f98bbc9874: Waiting Jan 16 21:07:09.783038 systemd[1870]: Queued start job for default target default.target. Jan 16 21:07:09.794805 systemd[1870]: Created slice app.slice - User Application Slice. Jan 16 21:07:09.794850 systemd[1870]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jan 16 21:07:09.794867 systemd[1870]: Reached target paths.target - Paths. Jan 16 21:07:09.794928 systemd[1870]: Reached target timers.target - Timers. Jan 16 21:07:09.796509 systemd[1870]: Starting dbus.socket - D-Bus User Message Bus Socket... Jan 16 21:07:09.799124 systemd[1870]: Starting systemd-tmpfiles-setup.service - Create User Files and Directories... Jan 16 21:07:09.823309 systemd[1870]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jan 16 21:07:09.823413 systemd[1870]: Reached target sockets.target - Sockets. Jan 16 21:07:09.827474 systemd[1870]: Finished systemd-tmpfiles-setup.service - Create User Files and Directories. Jan 16 21:07:09.827600 systemd[1870]: Reached target basic.target - Basic System. Jan 16 21:07:09.827674 systemd[1870]: Reached target default.target - Main User Target. Jan 16 21:07:09.827710 systemd[1870]: Startup finished in 222ms. Jan 16 21:07:09.828305 systemd[1]: Started user@500.service - User Manager for UID 500. Jan 16 21:07:09.856584 systemd[1]: Started session-1.scope - Session 1 of User core. Jan 16 21:07:09.926547 etcd-wrapper[1856]: d462aa345367: Verifying Checksum Jan 16 21:07:09.926547 etcd-wrapper[1856]: d462aa345367: Download complete Jan 16 21:07:09.934068 etcd-wrapper[1856]: f5083dc2076d: Download complete Jan 16 21:07:09.948716 etcd-wrapper[1856]: 2ae710cd8bfe: Verifying Checksum Jan 16 21:07:09.948716 etcd-wrapper[1856]: 2ae710cd8bfe: Download complete Jan 16 21:07:09.965226 etcd-wrapper[1856]: f5083dc2076d: Pull complete Jan 16 21:07:09.983911 systemd[1]: var-lib-docker-overlay2-060530e9eed19f37753e866994732892d8fc6916f8bedc7c60bf5190c82e2ee2-merged.mount: Deactivated successfully. Jan 16 21:07:09.995617 etcd-wrapper[1856]: 2ae710cd8bfe: Pull complete Jan 16 21:07:10.061321 systemd[1]: Started sshd@1-64.23.236.65:22-68.220.241.50:37604.service - OpenSSH per-connection server daemon (68.220.241.50:37604). Jan 16 21:07:10.182536 etcd-wrapper[1856]: d557676654e5: Verifying Checksum Jan 16 21:07:10.182821 etcd-wrapper[1856]: d557676654e5: Download complete Jan 16 21:07:10.198707 etcd-wrapper[1856]: c8022d07192e: Verifying Checksum Jan 16 21:07:10.198892 etcd-wrapper[1856]: c8022d07192e: Download complete Jan 16 21:07:10.383243 etcd-wrapper[1856]: 0f8b424aa0b9: Verifying Checksum Jan 16 21:07:10.383714 etcd-wrapper[1856]: 0f8b424aa0b9: Download complete Jan 16 21:07:10.412558 etcd-wrapper[1856]: d858cbc252ad: Verifying Checksum Jan 16 21:07:10.412558 etcd-wrapper[1856]: d858cbc252ad: Download complete Jan 16 21:07:10.439094 sshd[1900]: Accepted publickey for core from 68.220.241.50 port 37604 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:10.442088 sshd-session[1900]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:10.450150 systemd-logind[1485]: New session 3 of user core. Jan 16 21:07:10.458061 systemd[1]: Started session-3.scope - Session 3 of User core. Jan 16 21:07:10.463254 systemd[1]: var-lib-docker-overlay2-e91b76b5cffffd0caa38084f81af3a20b06232233aa80828f4239630c7a127c4-merged.mount: Deactivated successfully. Jan 16 21:07:10.468764 etcd-wrapper[1856]: 1069fc2daed1: Verifying Checksum Jan 16 21:07:10.468764 etcd-wrapper[1856]: 1069fc2daed1: Download complete Jan 16 21:07:10.496512 etcd-wrapper[1856]: d462aa345367: Pull complete Jan 16 21:07:10.505709 etcd-wrapper[1856]: 0f8b424aa0b9: Pull complete Jan 16 21:07:10.520480 etcd-wrapper[1856]: d557676654e5: Pull complete Jan 16 21:07:10.531095 etcd-wrapper[1856]: c8022d07192e: Pull complete Jan 16 21:07:10.545572 etcd-wrapper[1856]: d858cbc252ad: Pull complete Jan 16 21:07:10.557122 etcd-wrapper[1856]: 1069fc2daed1: Pull complete Jan 16 21:07:10.632982 sshd[1906]: Connection closed by 68.220.241.50 port 37604 Jan 16 21:07:10.632773 sshd-session[1900]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:10.635749 etcd-wrapper[1856]: 5318d93a3a65: Verifying Checksum Jan 16 21:07:10.635749 etcd-wrapper[1856]: 5318d93a3a65: Download complete Jan 16 21:07:10.639483 systemd[1]: sshd@1-64.23.236.65:22-68.220.241.50:37604.service: Deactivated successfully. Jan 16 21:07:10.642312 systemd[1]: session-3.scope: Deactivated successfully. Jan 16 21:07:10.644496 systemd-logind[1485]: Session 3 logged out. Waiting for processes to exit. Jan 16 21:07:10.646391 systemd-logind[1485]: Removed session 3. Jan 16 21:07:10.712214 systemd[1]: Started sshd@2-64.23.236.65:22-68.220.241.50:37618.service - OpenSSH per-connection server daemon (68.220.241.50:37618). Jan 16 21:07:10.738126 etcd-wrapper[1856]: b40161cd83fc: Verifying Checksum Jan 16 21:07:10.738126 etcd-wrapper[1856]: b40161cd83fc: Download complete Jan 16 21:07:10.756740 systemd[1]: var-lib-docker-overlay2-1b9c97c36a6fc5dec990f6ad3139e48e7260129b7b2732a11d0bb483b169ec30-merged.mount: Deactivated successfully. Jan 16 21:07:10.763941 etcd-wrapper[1856]: b40161cd83fc: Pull complete Jan 16 21:07:10.777137 systemd[1]: var-lib-docker-overlay2-15dd67f220fe52111f461e4c4adca4bbb899749bc72efbd86f98b247e32c3325-merged.mount: Deactivated successfully. Jan 16 21:07:10.781723 etcd-wrapper[1856]: 5318d93a3a65: Pull complete Jan 16 21:07:10.817362 etcd-wrapper[1856]: 307c1adadb60: Verifying Checksum Jan 16 21:07:10.817362 etcd-wrapper[1856]: 307c1adadb60: Download complete Jan 16 21:07:10.833196 etcd-wrapper[1856]: 307c1adadb60: Pull complete Jan 16 21:07:11.054978 etcd-wrapper[1856]: 6f77055ebb6e: Verifying Checksum Jan 16 21:07:11.054978 etcd-wrapper[1856]: 6f77055ebb6e: Download complete Jan 16 21:07:11.068921 sshd[1933]: Accepted publickey for core from 68.220.241.50 port 37618 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:11.073257 sshd-session[1933]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:11.078386 etcd-wrapper[1856]: 60a82e1b19c6: Verifying Checksum Jan 16 21:07:11.078386 etcd-wrapper[1856]: 60a82e1b19c6: Download complete Jan 16 21:07:11.083639 systemd-logind[1485]: New session 4 of user core. Jan 16 21:07:11.090225 systemd[1]: Started session-4.scope - Session 4 of User core. Jan 16 21:07:11.137485 etcd-wrapper[1856]: 67f98bbc9874: Verifying Checksum Jan 16 21:07:11.138596 etcd-wrapper[1856]: 67f98bbc9874: Download complete Jan 16 21:07:11.258728 sshd[1957]: Connection closed by 68.220.241.50 port 37618 Jan 16 21:07:11.259566 sshd-session[1933]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:11.268366 systemd[1]: sshd@2-64.23.236.65:22-68.220.241.50:37618.service: Deactivated successfully. Jan 16 21:07:11.270971 systemd[1]: session-4.scope: Deactivated successfully. Jan 16 21:07:11.272468 systemd-logind[1485]: Session 4 logged out. Waiting for processes to exit. Jan 16 21:07:11.274451 systemd-logind[1485]: Removed session 4. Jan 16 21:07:11.367544 etcd-wrapper[1856]: 60a82e1b19c6: Pull complete Jan 16 21:07:11.553167 etcd-wrapper[1856]: 6f77055ebb6e: Pull complete Jan 16 21:07:11.706373 systemd[1]: var-lib-docker-overlay2-4a9f50ecb8967279d335242a64c2466563cc90ffa3f99fd065480b3e7ed332e8-merged.mount: Deactivated successfully. Jan 16 21:07:11.719072 etcd-wrapper[1856]: 67f98bbc9874: Pull complete Jan 16 21:07:11.724525 etcd-wrapper[1856]: Digest: sha256:51efcfc4f3a863c072ebe745942f790878c2a268e713a6d140c4f2593271adc6 Jan 16 21:07:11.725816 etcd-wrapper[1856]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.22 Jan 16 21:07:11.735140 systemd[1]: var-lib-docker-overlay2-15cca15d60d72f2468928564671c351e5284d7b6170ad1d19bd40b9e4293670e\x2dinit-merged.mount: Deactivated successfully. Jan 16 21:07:11.770208 containerd[1506]: time="2026-01-16T21:07:11.770137740Z" level=info msg="connecting to shim 8252c0fa4cf2d9b7e4b82bed52f63ad0784d20cfc70770bfde34388f36e9e658" address="unix:///run/containerd/s/a2becc01791faad607f53be12946f64f0c7519bd935f9d5c3f09b24f7b2b15c6" namespace=moby protocol=ttrpc version=3 Jan 16 21:07:11.824384 systemd[1]: Started docker-8252c0fa4cf2d9b7e4b82bed52f63ad0784d20cfc70770bfde34388f36e9e658.scope - libcontainer container 8252c0fa4cf2d9b7e4b82bed52f63ad0784d20cfc70770bfde34388f36e9e658. Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.913066Z","caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.913275Z","caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"88d416ebbba7433ba143a63d0c5a9e9e"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913301Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913309Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.22"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913313Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913318Z","caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913396Z","caller":"embed/config.go:689","msg":"Running http and grpc server on single port. This is not recommended for production."} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.913442Z","caller":"etcdmain/etcd.go:73","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.124.0.23:2379"]} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.913530Z","caller":"embed/config.go:689","msg":"Running http and grpc server on single port. This is not recommended for production."} Jan 16 21:07:11.913892 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.913541Z","caller":"embed/etcd.go:140","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Jan 16 21:07:11.915258 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.914981Z","caller":"embed/etcd.go:148","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jan 16 21:07:11.915539 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.915275Z","caller":"embed/etcd.go:323","msg":"starting an etcd server","etcd-version":"3.5.22","git-sha":"7862c85","go-version":"go1.23.11","go-os":"linux","go-arch":"amd64","max-cpu-set":2,"max-cpu-available":2,"member-initialized":false,"name":"88d416ebbba7433ba143a63d0c5a9e9e","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"max-wals":5,"max-snapshots":5,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.124.0.23:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"88d416ebbba7433ba143a63d0c5a9e9e=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-backend-bytes":2147483648,"max-request-bytes":1572864,"max-concurrent-streams":4294967295,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","compact-check-time-enabled":false,"compact-check-time-interval":"1m0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Jan 16 21:07:11.917030 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.916822Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"1.122188ms"} Jan 16 21:07:11.919637 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919369Z","caller":"etcdserver/raft.go:507","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Jan 16 21:07:11.919990 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919463Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Jan 16 21:07:11.919990 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919649Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Jan 16 21:07:11.919990 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919662Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jan 16 21:07:11.919990 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919669Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Jan 16 21:07:11.919990 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.919715Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Jan 16 21:07:11.921795 etcd-wrapper[1856]: {"level":"warn","ts":"2026-01-16T21:07:11.921546Z","caller":"auth/store.go:1241","msg":"simple token is not cryptographically signed"} Jan 16 21:07:11.922735 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.922499Z","caller":"mvcc/kvstore.go:425","msg":"kvstore restored","current-rev":1} Jan 16 21:07:11.922735 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.922557Z","caller":"etcdserver/server.go:628","msg":"restore consistentIndex","index":0} Jan 16 21:07:11.924604 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.924350Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jan 16 21:07:11.925203 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.925060Z","caller":"etcdserver/server.go:875","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.22","cluster-version":"to_be_decided"} Jan 16 21:07:11.926215 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.925576Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} Jan 16 21:07:11.926215 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.925810Z","caller":"etcdserver/server.go:759","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Jan 16 21:07:11.926441 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.926029Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/snap","suffix":"snap.db","max":5,"interval":"30s"} Jan 16 21:07:11.926441 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.926149Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/snap","suffix":"snap","max":5,"interval":"30s"} Jan 16 21:07:11.926592 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.926274Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/wal","suffix":"wal","max":5,"interval":"30s"} Jan 16 21:07:11.926790 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.926658Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Jan 16 21:07:11.927012 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.926864Z","caller":"membership/cluster.go:421","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"],"added-peer-is-learner":false} Jan 16 21:07:11.928603 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.928399Z","caller":"embed/etcd.go:633","msg":"serving peer traffic","address":"127.0.0.1:2380"} Jan 16 21:07:11.928603 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.928434Z","caller":"embed/etcd.go:603","msg":"cmux::serve","address":"127.0.0.1:2380"} Jan 16 21:07:11.928937 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:11.928480Z","caller":"embed/etcd.go:292","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.124.0.23:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.120830Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.120886Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.120902Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.120916Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.120945Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.121080Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Jan 16 21:07:12.121442 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.121105Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Jan 16 21:07:12.122645 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.122407Z","caller":"etcdserver/server.go:2697","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Jan 16 21:07:12.123656 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.122799Z","caller":"etcdserver/server.go:2144","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:88d416ebbba7433ba143a63d0c5a9e9e ClientURLs:[http://10.124.0.23:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Jan 16 21:07:12.123656 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.122827Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} Jan 16 21:07:12.123656 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.123022Z","caller":"membership/cluster.go:587","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Jan 16 21:07:12.124088 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.123675Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jan 16 21:07:12.124088 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.123748Z","caller":"etcdserver/server.go:2721","msg":"cluster version is updated","cluster-version":"3.5"} Jan 16 21:07:12.124354 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.124110Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} Jan 16 21:07:12.124601 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.124404Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} Jan 16 21:07:12.125001 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.124540Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} Jan 16 21:07:12.125588 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jan 16 21:07:12.126507 etcd-wrapper[1856]: {"level":"info","ts":"2026-01-16T21:07:12.126260Z","caller":"embed/serve.go:210","msg":"serving client traffic insecurely; this is strongly discouraged!","traffic":"grpc+http","address":"[::]:2379"} Jan 16 21:07:12.126582 systemd[1]: Reached target multi-user.target - Multi-User System. Jan 16 21:07:12.126755 systemd[1]: Startup finished in 2.834s (kernel) + 4.490s (initrd) + 11.160s (userspace) = 18.484s. Jan 16 21:07:21.069180 systemd[1]: Started sshd@3-64.23.236.65:22-176.126.103.184:35414.service - OpenSSH per-connection server daemon (176.126.103.184:35414). Jan 16 21:07:21.333266 systemd[1]: Started sshd@4-64.23.236.65:22-68.220.241.50:46534.service - OpenSSH per-connection server daemon (68.220.241.50:46534). Jan 16 21:07:21.697589 sshd[2037]: Accepted publickey for core from 68.220.241.50 port 46534 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:21.699904 sshd-session[2037]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:21.707165 systemd-logind[1485]: New session 5 of user core. Jan 16 21:07:21.714269 systemd[1]: Started session-5.scope - Session 5 of User core. Jan 16 21:07:21.875997 sshd[2033]: Connection closed by authenticating user root 176.126.103.184 port 35414 [preauth] Jan 16 21:07:21.879408 systemd[1]: sshd@3-64.23.236.65:22-176.126.103.184:35414.service: Deactivated successfully. Jan 16 21:07:21.885228 sshd[2041]: Connection closed by 68.220.241.50 port 46534 Jan 16 21:07:21.886150 sshd-session[2037]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:21.891154 systemd-logind[1485]: Session 5 logged out. Waiting for processes to exit. Jan 16 21:07:21.891413 systemd[1]: sshd@4-64.23.236.65:22-68.220.241.50:46534.service: Deactivated successfully. Jan 16 21:07:21.893644 systemd[1]: session-5.scope: Deactivated successfully. Jan 16 21:07:21.896444 systemd-logind[1485]: Removed session 5. Jan 16 21:07:21.957618 systemd[1]: Started sshd@5-64.23.236.65:22-68.220.241.50:46542.service - OpenSSH per-connection server daemon (68.220.241.50:46542). Jan 16 21:07:22.076871 systemd[1]: Started sshd@6-64.23.236.65:22-176.126.103.184:35424.service - OpenSSH per-connection server daemon (176.126.103.184:35424). Jan 16 21:07:22.325135 sshd[2049]: Accepted publickey for core from 68.220.241.50 port 46542 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:22.326383 sshd-session[2049]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:22.332828 systemd-logind[1485]: New session 6 of user core. Jan 16 21:07:22.340255 systemd[1]: Started session-6.scope - Session 6 of User core. Jan 16 21:07:22.508337 sshd[2057]: Connection closed by 68.220.241.50 port 46542 Jan 16 21:07:22.509094 sshd-session[2049]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:22.515522 systemd[1]: sshd@5-64.23.236.65:22-68.220.241.50:46542.service: Deactivated successfully. Jan 16 21:07:22.518304 systemd[1]: session-6.scope: Deactivated successfully. Jan 16 21:07:22.519736 systemd-logind[1485]: Session 6 logged out. Waiting for processes to exit. Jan 16 21:07:22.522221 systemd-logind[1485]: Removed session 6. Jan 16 21:07:22.606194 systemd[1]: Started sshd@7-64.23.236.65:22-68.220.241.50:60698.service - OpenSSH per-connection server daemon (68.220.241.50:60698). Jan 16 21:07:22.882582 sshd[2053]: Connection closed by authenticating user root 176.126.103.184 port 35424 [preauth] Jan 16 21:07:22.885043 systemd[1]: sshd@6-64.23.236.65:22-176.126.103.184:35424.service: Deactivated successfully. Jan 16 21:07:23.013421 sshd[2063]: Accepted publickey for core from 68.220.241.50 port 60698 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:23.015110 sshd-session[2063]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:23.024224 systemd-logind[1485]: New session 7 of user core. Jan 16 21:07:23.032311 systemd[1]: Started session-7.scope - Session 7 of User core. Jan 16 21:07:23.090399 systemd[1]: Started sshd@8-64.23.236.65:22-176.126.103.184:55520.service - OpenSSH per-connection server daemon (176.126.103.184:55520). Jan 16 21:07:23.228052 sshd[2069]: Connection closed by 68.220.241.50 port 60698 Jan 16 21:07:23.227557 sshd-session[2063]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:23.232763 systemd[1]: sshd@7-64.23.236.65:22-68.220.241.50:60698.service: Deactivated successfully. Jan 16 21:07:23.235331 systemd[1]: session-7.scope: Deactivated successfully. Jan 16 21:07:23.238491 systemd-logind[1485]: Session 7 logged out. Waiting for processes to exit. Jan 16 21:07:23.239487 systemd-logind[1485]: Removed session 7. Jan 16 21:07:23.294391 systemd[1]: Started sshd@9-64.23.236.65:22-68.220.241.50:60708.service - OpenSSH per-connection server daemon (68.220.241.50:60708). Jan 16 21:07:23.645589 sshd[2079]: Accepted publickey for core from 68.220.241.50 port 60708 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:23.647598 sshd-session[2079]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:23.653891 systemd-logind[1485]: New session 8 of user core. Jan 16 21:07:23.660290 systemd[1]: Started session-8.scope - Session 8 of User core. Jan 16 21:07:23.791377 sudo[2084]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jan 16 21:07:23.791863 sudo[2084]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 16 21:07:23.804294 sudo[2084]: pam_unix(sudo:session): session closed for user root Jan 16 21:07:23.865208 sshd[2083]: Connection closed by 68.220.241.50 port 60708 Jan 16 21:07:23.866120 sshd-session[2079]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:23.871450 systemd[1]: sshd@9-64.23.236.65:22-68.220.241.50:60708.service: Deactivated successfully. Jan 16 21:07:23.874135 systemd[1]: session-8.scope: Deactivated successfully. Jan 16 21:07:23.876263 systemd-logind[1485]: Session 8 logged out. Waiting for processes to exit. Jan 16 21:07:23.877853 systemd-logind[1485]: Removed session 8. Jan 16 21:07:23.894989 sshd[2071]: Connection closed by authenticating user root 176.126.103.184 port 55520 [preauth] Jan 16 21:07:23.898162 systemd[1]: sshd@8-64.23.236.65:22-176.126.103.184:55520.service: Deactivated successfully. Jan 16 21:07:23.936142 systemd[1]: Started sshd@10-64.23.236.65:22-68.220.241.50:60724.service - OpenSSH per-connection server daemon (68.220.241.50:60724). Jan 16 21:07:24.097876 systemd[1]: Started sshd@11-64.23.236.65:22-176.126.103.184:55524.service - OpenSSH per-connection server daemon (176.126.103.184:55524). Jan 16 21:07:24.298005 sshd[2093]: Accepted publickey for core from 68.220.241.50 port 60724 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:24.299611 sshd-session[2093]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:24.307352 systemd-logind[1485]: New session 9 of user core. Jan 16 21:07:24.316312 systemd[1]: Started session-9.scope - Session 9 of User core. Jan 16 21:07:24.430274 sudo[2103]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 16 21:07:24.430623 sudo[2103]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 16 21:07:24.433274 sudo[2103]: pam_unix(sudo:session): session closed for user root Jan 16 21:07:24.441663 sudo[2102]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/systemctl restart audit-rules Jan 16 21:07:24.442063 sudo[2102]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 16 21:07:24.451411 systemd[1]: Starting audit-rules.service - Load Audit Rules... Jan 16 21:07:24.503000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 16 21:07:24.505006 augenrules[2127]: No rules Jan 16 21:07:24.505342 kernel: kauditd_printk_skb: 165 callbacks suppressed Jan 16 21:07:24.505421 kernel: audit: type=1305 audit(1768597644.503:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 16 21:07:24.503000 audit[2127]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff48b0f150 a2=420 a3=0 items=0 ppid=2108 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/bin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:24.507127 systemd[1]: audit-rules.service: Deactivated successfully. Jan 16 21:07:24.507597 systemd[1]: Finished audit-rules.service - Load Audit Rules. Jan 16 21:07:24.510067 kernel: audit: type=1300 audit(1768597644.503:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff48b0f150 a2=420 a3=0 items=0 ppid=2108 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/bin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:24.510940 sudo[2102]: pam_unix(sudo:session): session closed for user root Jan 16 21:07:24.503000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jan 16 21:07:24.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.515568 kernel: audit: type=1327 audit(1768597644.503:198): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jan 16 21:07:24.515637 kernel: audit: type=1130 audit(1768597644.506:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.515694 kernel: audit: type=1131 audit(1768597644.506:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.510000 audit[2102]: USER_END pid=2102 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_umask,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.521209 kernel: audit: type=1106 audit(1768597644.510:201): pid=2102 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_umask,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.521360 kernel: audit: type=1104 audit(1768597644.510:202): pid=2102 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.510000 audit[2102]: CRED_DISP pid=2102 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.574226 sshd[2101]: Connection closed by 68.220.241.50 port 60724 Jan 16 21:07:24.572223 sshd-session[2093]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:24.574000 audit[2093]: USER_END pid=2093 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:24.579678 systemd[1]: sshd@10-64.23.236.65:22-68.220.241.50:60724.service: Deactivated successfully. Jan 16 21:07:24.584007 kernel: audit: type=1106 audit(1768597644.574:203): pid=2093 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:24.584110 kernel: audit: type=1104 audit(1768597644.575:204): pid=2093 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:24.575000 audit[2093]: CRED_DISP pid=2093 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:24.582245 systemd[1]: session-9.scope: Deactivated successfully. Jan 16 21:07:24.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-64.23.236.65:22-68.220.241.50:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.587824 systemd-logind[1485]: Session 9 logged out. Waiting for processes to exit. Jan 16 21:07:24.588034 kernel: audit: type=1131 audit(1768597644.579:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-64.23.236.65:22-68.220.241.50:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.589080 systemd-logind[1485]: Removed session 9. Jan 16 21:07:24.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-64.23.236.65:22-68.220.241.50:60734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:24.647923 systemd[1]: Started sshd@12-64.23.236.65:22-68.220.241.50:60734.service - OpenSSH per-connection server daemon (68.220.241.50:60734). Jan 16 21:07:24.902773 sshd[2097]: Connection closed by authenticating user root 176.126.103.184 port 55524 [preauth] Jan 16 21:07:24.901000 audit[2097]: USER_ERR pid=2097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:24.905821 systemd[1]: sshd@11-64.23.236.65:22-176.126.103.184:55524.service: Deactivated successfully. Jan 16 21:07:24.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-64.23.236.65:22-176.126.103.184:55524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.012000 audit[2136]: USER_ACCT pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_time,pam_unix,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.014049 sshd[2136]: Accepted publickey for core from 68.220.241.50 port 60734 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:25.014000 audit[2136]: CRED_ACQ pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.014000 audit[2136]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7ffe89360920 a2=3 a3=0 items=0 ppid=1 pid=2136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd-session" exe="/usr/lib64/misc/sshd-session" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:25.014000 audit: PROCTITLE proctitle=737368642D73657373696F6E3A20636F7265205B707269765D Jan 16 21:07:25.016043 sshd-session[2136]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:25.022909 systemd-logind[1485]: New session 10 of user core. Jan 16 21:07:25.032542 systemd[1]: Started session-10.scope - Session 10 of User core. Jan 16 21:07:25.036000 audit[2136]: USER_START pid=2136 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.039000 audit[2142]: CRED_ACQ pid=2142 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-64.23.236.65:22-176.126.103.184:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.114690 systemd[1]: Started sshd@13-64.23.236.65:22-176.126.103.184:55528.service - OpenSSH per-connection server daemon (176.126.103.184:55528). Jan 16 21:07:25.200081 sshd[2142]: Connection closed by 68.220.241.50 port 60734 Jan 16 21:07:25.200103 sshd-session[2136]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:25.203000 audit[2136]: USER_END pid=2136 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.203000 audit[2136]: CRED_DISP pid=2136 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.209428 systemd[1]: sshd@12-64.23.236.65:22-68.220.241.50:60734.service: Deactivated successfully. Jan 16 21:07:25.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-64.23.236.65:22-68.220.241.50:60734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.212477 systemd[1]: session-10.scope: Deactivated successfully. Jan 16 21:07:25.213798 systemd-logind[1485]: Session 10 logged out. Waiting for processes to exit. Jan 16 21:07:25.216394 systemd-logind[1485]: Removed session 10. Jan 16 21:07:25.284314 systemd[1]: Started sshd@14-64.23.236.65:22-68.220.241.50:60742.service - OpenSSH per-connection server daemon (68.220.241.50:60742). Jan 16 21:07:25.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-64.23.236.65:22-68.220.241.50:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.674000 audit[2154]: USER_ACCT pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_time,pam_unix,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.675674 sshd[2154]: Accepted publickey for core from 68.220.241.50 port 60742 ssh2: RSA SHA256:0TIfaCMFjZ+DZLKyAY8AqXCIwfcgirSh3KulVUQk9aI Jan 16 21:07:25.676000 audit[2154]: CRED_ACQ pid=2154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.676000 audit[2154]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7ffccd9f4590 a2=3 a3=0 items=0 ppid=1 pid=2154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd-session" exe="/usr/lib64/misc/sshd-session" subj=system_u:system_r:kernel_t:s0 key=(null) Jan 16 21:07:25.676000 audit: PROCTITLE proctitle=737368642D73657373696F6E3A20636F7265205B707269765D Jan 16 21:07:25.677910 sshd-session[2154]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 16 21:07:25.685708 systemd-logind[1485]: New session 11 of user core. Jan 16 21:07:25.698332 systemd[1]: Started session-11.scope - Session 11 of User core. Jan 16 21:07:25.702000 audit[2154]: USER_START pid=2154 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.705000 audit[2158]: CRED_ACQ pid=2158 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.935001 sshd[2144]: Connection closed by authenticating user root 176.126.103.184 port 55528 [preauth] Jan 16 21:07:25.934000 audit[2144]: USER_ERR pid=2144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:25.937166 systemd[1]: sshd@13-64.23.236.65:22-176.126.103.184:55528.service: Deactivated successfully. Jan 16 21:07:25.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-64.23.236.65:22-176.126.103.184:55528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.976193 sshd[2158]: Connection closed by 68.220.241.50 port 60742 Jan 16 21:07:25.977182 sshd-session[2154]: pam_unix(sshd:session): session closed for user core Jan 16 21:07:25.977000 audit[2154]: USER_END pid=2154 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.978000 audit[2154]: CRED_DISP pid=2154 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' Jan 16 21:07:25.982510 systemd[1]: sshd@14-64.23.236.65:22-68.220.241.50:60742.service: Deactivated successfully. Jan 16 21:07:25.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-64.23.236.65:22-68.220.241.50:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:25.985293 systemd[1]: session-11.scope: Deactivated successfully. Jan 16 21:07:25.986415 systemd-logind[1485]: Session 11 logged out. Waiting for processes to exit. Jan 16 21:07:25.988435 systemd-logind[1485]: Removed session 11. Jan 16 21:07:26.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-64.23.236.65:22-176.126.103.184:55532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:26.158455 systemd[1]: Started sshd@15-64.23.236.65:22-176.126.103.184:55532.service - OpenSSH per-connection server daemon (176.126.103.184:55532). Jan 16 21:07:26.983206 sshd[2171]: Connection closed by authenticating user root 176.126.103.184 port 55532 [preauth] Jan 16 21:07:26.982000 audit[2171]: USER_ERR pid=2171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:26.986404 systemd[1]: sshd@15-64.23.236.65:22-176.126.103.184:55532.service: Deactivated successfully. Jan 16 21:07:26.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-64.23.236.65:22-176.126.103.184:55532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:27.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-64.23.236.65:22-176.126.103.184:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:27.186995 systemd[1]: Started sshd@16-64.23.236.65:22-176.126.103.184:55544.service - OpenSSH per-connection server daemon (176.126.103.184:55544). Jan 16 21:07:28.000013 sshd[2177]: Connection closed by authenticating user root 176.126.103.184 port 55544 [preauth] Jan 16 21:07:27.999000 audit[2177]: USER_ERR pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:28.003301 systemd[1]: sshd@16-64.23.236.65:22-176.126.103.184:55544.service: Deactivated successfully. Jan 16 21:07:28.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-64.23.236.65:22-176.126.103.184:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:28.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-64.23.236.65:22-176.126.103.184:55546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:28.196491 systemd[1]: Started sshd@17-64.23.236.65:22-176.126.103.184:55546.service - OpenSSH per-connection server daemon (176.126.103.184:55546). Jan 16 21:07:28.994999 sshd[2183]: Connection closed by authenticating user root 176.126.103.184 port 55546 [preauth] Jan 16 21:07:28.994000 audit[2183]: USER_ERR pid=2183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:28.997890 systemd[1]: sshd@17-64.23.236.65:22-176.126.103.184:55546.service: Deactivated successfully. Jan 16 21:07:28.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-64.23.236.65:22-176.126.103.184:55546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:29.196973 systemd[1]: Started sshd@18-64.23.236.65:22-176.126.103.184:55552.service - OpenSSH per-connection server daemon (176.126.103.184:55552). Jan 16 21:07:29.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-64.23.236.65:22-176.126.103.184:55552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:29.992740 sshd[2189]: Connection closed by authenticating user root 176.126.103.184 port 55552 [preauth] Jan 16 21:07:29.996475 kernel: kauditd_printk_skb: 37 callbacks suppressed Jan 16 21:07:29.996665 kernel: audit: type=1109 audit(1768597649.991:239): pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:29.991000 audit[2189]: USER_ERR pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:29.994452 systemd[1]: sshd@18-64.23.236.65:22-176.126.103.184:55552.service: Deactivated successfully. Jan 16 21:07:29.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-64.23.236.65:22-176.126.103.184:55552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:30.001149 kernel: audit: type=1131 audit(1768597649.994:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-64.23.236.65:22-176.126.103.184:55552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:30.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-64.23.236.65:22-176.126.103.184:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:30.197087 systemd[1]: Started sshd@19-64.23.236.65:22-176.126.103.184:55560.service - OpenSSH per-connection server daemon (176.126.103.184:55560). Jan 16 21:07:30.202035 kernel: audit: type=1130 audit(1768597650.196:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-64.23.236.65:22-176.126.103.184:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:31.004303 sshd[2195]: Connection closed by authenticating user root 176.126.103.184 port 55560 [preauth] Jan 16 21:07:31.004000 audit[2195]: USER_ERR pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:31.007578 systemd[1]: sshd@19-64.23.236.65:22-176.126.103.184:55560.service: Deactivated successfully. Jan 16 21:07:31.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-64.23.236.65:22-176.126.103.184:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:31.011257 kernel: audit: type=1109 audit(1768597651.004:242): pid=2195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:31.011345 kernel: audit: type=1131 audit(1768597651.007:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-64.23.236.65:22-176.126.103.184:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:31.207975 systemd[1]: Started sshd@20-64.23.236.65:22-176.126.103.184:55566.service - OpenSSH per-connection server daemon (176.126.103.184:55566). Jan 16 21:07:31.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-64.23.236.65:22-176.126.103.184:55566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:31.213070 kernel: audit: type=1130 audit(1768597651.207:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-64.23.236.65:22-176.126.103.184:55566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:31.998535 sshd[2201]: Connection closed by authenticating user root 176.126.103.184 port 55566 [preauth] Jan 16 21:07:31.997000 audit[2201]: USER_ERR pid=2201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:32.003126 systemd[1]: sshd@20-64.23.236.65:22-176.126.103.184:55566.service: Deactivated successfully. Jan 16 21:07:32.006165 kernel: audit: type=1109 audit(1768597651.997:245): pid=2201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:32.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-64.23.236.65:22-176.126.103.184:55566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:32.013023 kernel: audit: type=1131 audit(1768597652.002:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-64.23.236.65:22-176.126.103.184:55566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:32.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-64.23.236.65:22-176.126.103.184:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:32.215388 systemd[1]: Started sshd@21-64.23.236.65:22-176.126.103.184:32808.service - OpenSSH per-connection server daemon (176.126.103.184:32808). Jan 16 21:07:32.222003 kernel: audit: type=1130 audit(1768597652.214:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-64.23.236.65:22-176.126.103.184:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:33.028034 sshd[2207]: Connection closed by authenticating user root 176.126.103.184 port 32808 [preauth] Jan 16 21:07:33.027000 audit[2207]: USER_ERR pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:33.034767 systemd[1]: sshd@21-64.23.236.65:22-176.126.103.184:32808.service: Deactivated successfully. Jan 16 21:07:33.034992 kernel: audit: type=1109 audit(1768597653.027:248): pid=2207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:33.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-64.23.236.65:22-176.126.103.184:32808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:33.245422 systemd[1]: Started sshd@22-64.23.236.65:22-176.126.103.184:32824.service - OpenSSH per-connection server daemon (176.126.103.184:32824). Jan 16 21:07:33.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-64.23.236.65:22-176.126.103.184:32824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:34.075009 sshd[2213]: Connection closed by authenticating user root 176.126.103.184 port 32824 [preauth] Jan 16 21:07:34.074000 audit[2213]: USER_ERR pid=2213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:34.078081 systemd[1]: sshd@22-64.23.236.65:22-176.126.103.184:32824.service: Deactivated successfully. Jan 16 21:07:34.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-64.23.236.65:22-176.126.103.184:32824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:34.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-64.23.236.65:22-176.126.103.184:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:34.262237 systemd[1]: Started sshd@23-64.23.236.65:22-176.126.103.184:32838.service - OpenSSH per-connection server daemon (176.126.103.184:32838). Jan 16 21:07:35.033399 sshd[2219]: Connection closed by authenticating user root 176.126.103.184 port 32838 [preauth] Jan 16 21:07:35.038338 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:07:35.038422 kernel: audit: type=1109 audit(1768597655.033:254): pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:35.033000 audit[2219]: USER_ERR pid=2219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:35.041142 systemd[1]: sshd@23-64.23.236.65:22-176.126.103.184:32838.service: Deactivated successfully. Jan 16 21:07:35.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-64.23.236.65:22-176.126.103.184:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:35.044444 kernel: audit: type=1131 audit(1768597655.039:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-64.23.236.65:22-176.126.103.184:32838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:35.251095 systemd[1]: Started sshd@24-64.23.236.65:22-176.126.103.184:32842.service - OpenSSH per-connection server daemon (176.126.103.184:32842). Jan 16 21:07:35.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-64.23.236.65:22-176.126.103.184:32842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:35.256990 kernel: audit: type=1130 audit(1768597655.250:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-64.23.236.65:22-176.126.103.184:32842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:36.069335 sshd[2225]: Connection closed by authenticating user root 176.126.103.184 port 32842 [preauth] Jan 16 21:07:36.069000 audit[2225]: USER_ERR pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:36.074537 systemd[1]: sshd@24-64.23.236.65:22-176.126.103.184:32842.service: Deactivated successfully. Jan 16 21:07:36.075327 kernel: audit: type=1109 audit(1768597656.069:257): pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:36.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-64.23.236.65:22-176.126.103.184:32842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:36.079990 kernel: audit: type=1131 audit(1768597656.074:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-64.23.236.65:22-176.126.103.184:32842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:36.281920 systemd[1]: Started sshd@25-64.23.236.65:22-176.126.103.184:32852.service - OpenSSH per-connection server daemon (176.126.103.184:32852). Jan 16 21:07:36.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-64.23.236.65:22-176.126.103.184:32852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:36.288360 kernel: audit: type=1130 audit(1768597656.281:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-64.23.236.65:22-176.126.103.184:32852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:37.099390 sshd[2231]: Connection closed by authenticating user root 176.126.103.184 port 32852 [preauth] Jan 16 21:07:37.099000 audit[2231]: USER_ERR pid=2231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:37.103176 systemd[1]: sshd@25-64.23.236.65:22-176.126.103.184:32852.service: Deactivated successfully. Jan 16 21:07:37.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-64.23.236.65:22-176.126.103.184:32852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:37.105989 kernel: audit: type=1109 audit(1768597657.099:260): pid=2231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:37.106063 kernel: audit: type=1131 audit(1768597657.102:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-64.23.236.65:22-176.126.103.184:32852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:37.257535 systemd-resolved[1264]: Using degraded feature set UDP instead of UDP+EDNS0 for DNS server 67.207.67.2. Jan 16 21:07:37.277509 systemd-timesyncd[1391]: Contacted time server 65.182.224.60:123 (2.flatcar.pool.ntp.org). Jan 16 21:07:37.277584 systemd-timesyncd[1391]: Initial clock synchronization to Fri 2026-01-16 21:07:37.265687 UTC. Jan 16 21:07:37.315729 systemd[1]: Started sshd@26-64.23.236.65:22-176.126.103.184:32854.service - OpenSSH per-connection server daemon (176.126.103.184:32854). Jan 16 21:07:37.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-64.23.236.65:22-176.126.103.184:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:37.321993 kernel: audit: type=1130 audit(1768597657.315:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-64.23.236.65:22-176.126.103.184:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:38.125097 sshd[2237]: Connection closed by authenticating user root 176.126.103.184 port 32854 [preauth] Jan 16 21:07:38.124000 audit[2237]: USER_ERR pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:38.131040 kernel: audit: type=1109 audit(1768597658.124:263): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:38.131434 systemd[1]: sshd@26-64.23.236.65:22-176.126.103.184:32854.service: Deactivated successfully. Jan 16 21:07:38.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-64.23.236.65:22-176.126.103.184:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:38.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-64.23.236.65:22-176.126.103.184:32864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:38.329836 systemd[1]: Started sshd@27-64.23.236.65:22-176.126.103.184:32864.service - OpenSSH per-connection server daemon (176.126.103.184:32864). Jan 16 21:07:39.142731 sshd[2243]: Connection closed by authenticating user root 176.126.103.184 port 32864 [preauth] Jan 16 21:07:39.141000 audit[2243]: USER_ERR pid=2243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:39.145428 systemd[1]: sshd@27-64.23.236.65:22-176.126.103.184:32864.service: Deactivated successfully. Jan 16 21:07:39.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-64.23.236.65:22-176.126.103.184:32864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:39.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-64.23.236.65:22-176.126.103.184:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:39.347686 systemd[1]: Started sshd@28-64.23.236.65:22-176.126.103.184:32874.service - OpenSSH per-connection server daemon (176.126.103.184:32874). Jan 16 21:07:40.177178 sshd[2249]: Connection closed by authenticating user root 176.126.103.184 port 32874 [preauth] Jan 16 21:07:40.176000 audit[2249]: USER_ERR pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:40.178560 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:07:40.178615 kernel: audit: type=1109 audit(1768597660.176:269): pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:40.183812 systemd[1]: sshd@28-64.23.236.65:22-176.126.103.184:32874.service: Deactivated successfully. Jan 16 21:07:40.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-64.23.236.65:22-176.126.103.184:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:40.191063 kernel: audit: type=1131 audit(1768597660.183:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-64.23.236.65:22-176.126.103.184:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:40.366211 systemd-resolved[1264]: Using degraded feature set UDP instead of UDP+EDNS0 for DNS server 67.207.67.3. Jan 16 21:07:40.383781 systemd[1]: Started sshd@29-64.23.236.65:22-176.126.103.184:32880.service - OpenSSH per-connection server daemon (176.126.103.184:32880). Jan 16 21:07:40.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-64.23.236.65:22-176.126.103.184:32880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:40.390015 kernel: audit: type=1130 audit(1768597660.383:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-64.23.236.65:22-176.126.103.184:32880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:41.193006 sshd[2255]: Connection closed by authenticating user root 176.126.103.184 port 32880 [preauth] Jan 16 21:07:41.192000 audit[2255]: USER_ERR pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:41.196495 systemd[1]: sshd@29-64.23.236.65:22-176.126.103.184:32880.service: Deactivated successfully. Jan 16 21:07:41.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-64.23.236.65:22-176.126.103.184:32880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:41.199840 kernel: audit: type=1109 audit(1768597661.192:272): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:41.199906 kernel: audit: type=1131 audit(1768597661.194:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-64.23.236.65:22-176.126.103.184:32880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:41.393030 systemd[1]: Started sshd@30-64.23.236.65:22-176.126.103.184:32882.service - OpenSSH per-connection server daemon (176.126.103.184:32882). Jan 16 21:07:41.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-64.23.236.65:22-176.126.103.184:32882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:41.400336 kernel: audit: type=1130 audit(1768597661.392:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-64.23.236.65:22-176.126.103.184:32882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:42.191367 sshd[2261]: Connection closed by authenticating user root 176.126.103.184 port 32882 [preauth] Jan 16 21:07:42.191000 audit[2261]: USER_ERR pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:42.197333 kernel: audit: type=1109 audit(1768597662.191:275): pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:42.199725 systemd[1]: sshd@30-64.23.236.65:22-176.126.103.184:32882.service: Deactivated successfully. Jan 16 21:07:42.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-64.23.236.65:22-176.126.103.184:32882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:42.206043 kernel: audit: type=1131 audit(1768597662.199:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-64.23.236.65:22-176.126.103.184:32882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:42.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-64.23.236.65:22-176.126.103.184:53624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:42.401107 systemd[1]: Started sshd@31-64.23.236.65:22-176.126.103.184:53624.service - OpenSSH per-connection server daemon (176.126.103.184:53624). Jan 16 21:07:42.405994 kernel: audit: type=1130 audit(1768597662.400:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-64.23.236.65:22-176.126.103.184:53624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:43.200529 sshd[2267]: Connection closed by authenticating user root 176.126.103.184 port 53624 [preauth] Jan 16 21:07:43.200000 audit[2267]: USER_ERR pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:43.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-64.23.236.65:22-176.126.103.184:53624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:43.207068 kernel: audit: type=1109 audit(1768597663.200:278): pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:43.205724 systemd[1]: sshd@31-64.23.236.65:22-176.126.103.184:53624.service: Deactivated successfully. Jan 16 21:07:43.414631 systemd[1]: Started sshd@32-64.23.236.65:22-176.126.103.184:53640.service - OpenSSH per-connection server daemon (176.126.103.184:53640). Jan 16 21:07:43.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-64.23.236.65:22-176.126.103.184:53640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:44.235450 sshd[2273]: Connection closed by authenticating user root 176.126.103.184 port 53640 [preauth] Jan 16 21:07:44.234000 audit[2273]: USER_ERR pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:44.238175 systemd[1]: sshd@32-64.23.236.65:22-176.126.103.184:53640.service: Deactivated successfully. Jan 16 21:07:44.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-64.23.236.65:22-176.126.103.184:53640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:44.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-64.23.236.65:22-176.126.103.184:53656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:44.455323 systemd[1]: Started sshd@33-64.23.236.65:22-176.126.103.184:53656.service - OpenSSH per-connection server daemon (176.126.103.184:53656). Jan 16 21:07:45.288733 sshd[2279]: Connection closed by authenticating user root 176.126.103.184 port 53656 [preauth] Jan 16 21:07:45.295571 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:07:45.295626 kernel: audit: type=1109 audit(1768597665.287:284): pid=2279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:45.287000 audit[2279]: USER_ERR pid=2279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:45.291629 systemd[1]: sshd@33-64.23.236.65:22-176.126.103.184:53656.service: Deactivated successfully. Jan 16 21:07:45.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-64.23.236.65:22-176.126.103.184:53656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:45.298592 kernel: audit: type=1131 audit(1768597665.290:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-64.23.236.65:22-176.126.103.184:53656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:45.491320 systemd[1]: Started sshd@34-64.23.236.65:22-176.126.103.184:53672.service - OpenSSH per-connection server daemon (176.126.103.184:53672). Jan 16 21:07:45.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-64.23.236.65:22-176.126.103.184:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:45.496989 kernel: audit: type=1130 audit(1768597665.490:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-64.23.236.65:22-176.126.103.184:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:46.288877 sshd[2285]: Connection closed by authenticating user root 176.126.103.184 port 53672 [preauth] Jan 16 21:07:46.288000 audit[2285]: USER_ERR pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:46.293846 systemd[1]: sshd@34-64.23.236.65:22-176.126.103.184:53672.service: Deactivated successfully. Jan 16 21:07:46.298891 kernel: audit: type=1109 audit(1768597666.288:287): pid=2285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:46.299027 kernel: audit: type=1131 audit(1768597666.293:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-64.23.236.65:22-176.126.103.184:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:46.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-64.23.236.65:22-176.126.103.184:53672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:46.490032 systemd[1]: Started sshd@35-64.23.236.65:22-176.126.103.184:53680.service - OpenSSH per-connection server daemon (176.126.103.184:53680). Jan 16 21:07:46.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-64.23.236.65:22-176.126.103.184:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:46.496094 kernel: audit: type=1130 audit(1768597666.489:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-64.23.236.65:22-176.126.103.184:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:47.292282 sshd[2291]: Connection closed by authenticating user root 176.126.103.184 port 53680 [preauth] Jan 16 21:07:47.291000 audit[2291]: USER_ERR pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:47.296990 kernel: audit: type=1109 audit(1768597667.291:290): pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:47.297353 systemd[1]: sshd@35-64.23.236.65:22-176.126.103.184:53680.service: Deactivated successfully. Jan 16 21:07:47.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-64.23.236.65:22-176.126.103.184:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:47.305016 kernel: audit: type=1131 audit(1768597667.296:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-64.23.236.65:22-176.126.103.184:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:47.511637 systemd[1]: Started sshd@36-64.23.236.65:22-176.126.103.184:53684.service - OpenSSH per-connection server daemon (176.126.103.184:53684). Jan 16 21:07:47.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-64.23.236.65:22-176.126.103.184:53684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:47.518379 kernel: audit: type=1130 audit(1768597667.511:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-64.23.236.65:22-176.126.103.184:53684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:48.325995 sshd[2297]: Connection closed by authenticating user root 176.126.103.184 port 53684 [preauth] Jan 16 21:07:48.331575 kernel: audit: type=1109 audit(1768597668.325:293): pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:48.325000 audit[2297]: USER_ERR pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:48.331902 systemd[1]: sshd@36-64.23.236.65:22-176.126.103.184:53684.service: Deactivated successfully. Jan 16 21:07:48.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-64.23.236.65:22-176.126.103.184:53684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:48.529635 systemd[1]: Started sshd@37-64.23.236.65:22-176.126.103.184:53700.service - OpenSSH per-connection server daemon (176.126.103.184:53700). Jan 16 21:07:48.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-64.23.236.65:22-176.126.103.184:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:49.343738 sshd[2303]: Connection closed by authenticating user root 176.126.103.184 port 53700 [preauth] Jan 16 21:07:49.343000 audit[2303]: USER_ERR pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:49.346855 systemd[1]: sshd@37-64.23.236.65:22-176.126.103.184:53700.service: Deactivated successfully. Jan 16 21:07:49.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-64.23.236.65:22-176.126.103.184:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:49.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-64.23.236.65:22-176.126.103.184:53712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:49.555364 systemd[1]: Started sshd@38-64.23.236.65:22-176.126.103.184:53712.service - OpenSSH per-connection server daemon (176.126.103.184:53712). Jan 16 21:07:50.365907 sshd[2309]: Connection closed by authenticating user root 176.126.103.184 port 53712 [preauth] Jan 16 21:07:50.370248 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:07:50.370298 kernel: audit: type=1109 audit(1768597670.365:299): pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:50.365000 audit[2309]: USER_ERR pid=2309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:50.368533 systemd[1]: sshd@38-64.23.236.65:22-176.126.103.184:53712.service: Deactivated successfully. Jan 16 21:07:50.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-64.23.236.65:22-176.126.103.184:53712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:50.376108 kernel: audit: type=1131 audit(1768597670.367:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-64.23.236.65:22-176.126.103.184:53712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:50.576516 systemd[1]: Started sshd@39-64.23.236.65:22-176.126.103.184:53724.service - OpenSSH per-connection server daemon (176.126.103.184:53724). Jan 16 21:07:50.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-64.23.236.65:22-176.126.103.184:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:50.581981 kernel: audit: type=1130 audit(1768597670.576:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-64.23.236.65:22-176.126.103.184:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:50.667027 update_engine[1486]: I20260116 21:07:50.666743 1486 update_attempter.cc:509] Updating boot flags... Jan 16 21:07:51.414000 sshd[2315]: Connection closed by authenticating user root 176.126.103.184 port 53724 [preauth] Jan 16 21:07:51.413000 audit[2315]: USER_ERR pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:51.420031 kernel: audit: type=1109 audit(1768597671.413:302): pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:51.421242 systemd[1]: sshd@39-64.23.236.65:22-176.126.103.184:53724.service: Deactivated successfully. Jan 16 21:07:51.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-64.23.236.65:22-176.126.103.184:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:51.426012 kernel: audit: type=1131 audit(1768597671.420:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-64.23.236.65:22-176.126.103.184:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:51.632394 systemd[1]: Started sshd@40-64.23.236.65:22-176.126.103.184:53728.service - OpenSSH per-connection server daemon (176.126.103.184:53728). Jan 16 21:07:51.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-64.23.236.65:22-176.126.103.184:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:51.636989 kernel: audit: type=1130 audit(1768597671.631:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-64.23.236.65:22-176.126.103.184:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:52.444657 sshd[2339]: Connection closed by authenticating user root 176.126.103.184 port 53728 [preauth] Jan 16 21:07:52.443000 audit[2339]: USER_ERR pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:52.447090 systemd[1]: sshd@40-64.23.236.65:22-176.126.103.184:53728.service: Deactivated successfully. Jan 16 21:07:52.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-64.23.236.65:22-176.126.103.184:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:52.451965 kernel: audit: type=1109 audit(1768597672.443:305): pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:52.452053 kernel: audit: type=1131 audit(1768597672.447:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-64.23.236.65:22-176.126.103.184:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:52.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-64.23.236.65:22-176.126.103.184:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:52.653317 systemd[1]: Started sshd@41-64.23.236.65:22-176.126.103.184:41098.service - OpenSSH per-connection server daemon (176.126.103.184:41098). Jan 16 21:07:52.657990 kernel: audit: type=1130 audit(1768597672.652:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-64.23.236.65:22-176.126.103.184:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:53.466689 sshd[2345]: Connection closed by authenticating user root 176.126.103.184 port 41098 [preauth] Jan 16 21:07:53.466000 audit[2345]: USER_ERR pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:53.471499 systemd[1]: sshd@41-64.23.236.65:22-176.126.103.184:41098.service: Deactivated successfully. Jan 16 21:07:53.471979 kernel: audit: type=1109 audit(1768597673.466:308): pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:53.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-64.23.236.65:22-176.126.103.184:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:53.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-64.23.236.65:22-176.126.103.184:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:53.671731 systemd[1]: Started sshd@42-64.23.236.65:22-176.126.103.184:41112.service - OpenSSH per-connection server daemon (176.126.103.184:41112). Jan 16 21:07:54.490185 sshd[2351]: Connection closed by authenticating user root 176.126.103.184 port 41112 [preauth] Jan 16 21:07:54.489000 audit[2351]: USER_ERR pid=2351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:54.492844 systemd[1]: sshd@42-64.23.236.65:22-176.126.103.184:41112.service: Deactivated successfully. Jan 16 21:07:54.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-64.23.236.65:22-176.126.103.184:41112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:54.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-64.23.236.65:22-176.126.103.184:41122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:54.694185 systemd[1]: Started sshd@43-64.23.236.65:22-176.126.103.184:41122.service - OpenSSH per-connection server daemon (176.126.103.184:41122). Jan 16 21:07:55.504799 sshd[2357]: Connection closed by authenticating user root 176.126.103.184 port 41122 [preauth] Jan 16 21:07:55.504000 audit[2357]: USER_ERR pid=2357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:55.508359 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:07:55.508484 kernel: audit: type=1109 audit(1768597675.504:314): pid=2357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:55.507249 systemd[1]: sshd@43-64.23.236.65:22-176.126.103.184:41122.service: Deactivated successfully. Jan 16 21:07:55.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-64.23.236.65:22-176.126.103.184:41122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:55.511729 kernel: audit: type=1131 audit(1768597675.506:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-64.23.236.65:22-176.126.103.184:41122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:55.707005 systemd[1]: Started sshd@44-64.23.236.65:22-176.126.103.184:41124.service - OpenSSH per-connection server daemon (176.126.103.184:41124). Jan 16 21:07:55.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:55.712997 kernel: audit: type=1130 audit(1768597675.706:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:56.505664 sshd[2363]: Connection closed by authenticating user root 176.126.103.184 port 41124 [preauth] Jan 16 21:07:56.504000 audit[2363]: USER_ERR pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:56.508746 systemd[1]: sshd@44-64.23.236.65:22-176.126.103.184:41124.service: Deactivated successfully. Jan 16 21:07:56.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:56.511547 kernel: audit: type=1109 audit(1768597676.504:317): pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:56.511635 kernel: audit: type=1131 audit(1768597676.507:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:56.718018 systemd[1]: Started sshd@45-64.23.236.65:22-176.126.103.184:41128.service - OpenSSH per-connection server daemon (176.126.103.184:41128). Jan 16 21:07:56.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-64.23.236.65:22-176.126.103.184:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:56.723148 kernel: audit: type=1130 audit(1768597676.717:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-64.23.236.65:22-176.126.103.184:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:57.533854 sshd[2369]: Connection closed by authenticating user root 176.126.103.184 port 41128 [preauth] Jan 16 21:07:57.533000 audit[2369]: USER_ERR pid=2369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:57.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-64.23.236.65:22-176.126.103.184:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:57.537475 systemd[1]: sshd@45-64.23.236.65:22-176.126.103.184:41128.service: Deactivated successfully. Jan 16 21:07:57.540107 kernel: audit: type=1109 audit(1768597677.533:320): pid=2369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:57.540263 kernel: audit: type=1131 audit(1768597677.535:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-64.23.236.65:22-176.126.103.184:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:57.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-64.23.236.65:22-176.126.103.184:41142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:57.739238 systemd[1]: Started sshd@46-64.23.236.65:22-176.126.103.184:41142.service - OpenSSH per-connection server daemon (176.126.103.184:41142). Jan 16 21:07:57.744809 kernel: audit: type=1130 audit(1768597677.738:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-64.23.236.65:22-176.126.103.184:41142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:58.557023 sshd[2375]: Connection closed by authenticating user root 176.126.103.184 port 41142 [preauth] Jan 16 21:07:58.556000 audit[2375]: USER_ERR pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:58.559076 systemd[1]: sshd@46-64.23.236.65:22-176.126.103.184:41142.service: Deactivated successfully. Jan 16 21:07:58.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-64.23.236.65:22-176.126.103.184:41142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:58.561966 kernel: audit: type=1109 audit(1768597678.556:323): pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:58.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-64.23.236.65:22-176.126.103.184:41154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:58.759844 systemd[1]: Started sshd@47-64.23.236.65:22-176.126.103.184:41154.service - OpenSSH per-connection server daemon (176.126.103.184:41154). Jan 16 21:07:59.567038 sshd[2381]: Connection closed by authenticating user root 176.126.103.184 port 41154 [preauth] Jan 16 21:07:59.566000 audit[2381]: USER_ERR pid=2381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:07:59.570054 systemd[1]: sshd@47-64.23.236.65:22-176.126.103.184:41154.service: Deactivated successfully. Jan 16 21:07:59.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-64.23.236.65:22-176.126.103.184:41154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:07:59.773702 systemd[1]: Started sshd@48-64.23.236.65:22-176.126.103.184:41156.service - OpenSSH per-connection server daemon (176.126.103.184:41156). Jan 16 21:07:59.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-64.23.236.65:22-176.126.103.184:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:00.565452 sshd[2387]: Connection closed by authenticating user root 176.126.103.184 port 41156 [preauth] Jan 16 21:08:00.564000 audit[2387]: USER_ERR pid=2387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:00.566701 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:00.566782 kernel: audit: type=1109 audit(1768597680.564:329): pid=2387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:00.574187 systemd[1]: sshd@48-64.23.236.65:22-176.126.103.184:41156.service: Deactivated successfully. Jan 16 21:08:00.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-64.23.236.65:22-176.126.103.184:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:00.578996 kernel: audit: type=1131 audit(1768597680.573:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-64.23.236.65:22-176.126.103.184:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:00.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-64.23.236.65:22-176.126.103.184:41166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:00.763407 systemd[1]: Started sshd@49-64.23.236.65:22-176.126.103.184:41166.service - OpenSSH per-connection server daemon (176.126.103.184:41166). Jan 16 21:08:00.769034 kernel: audit: type=1130 audit(1768597680.763:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-64.23.236.65:22-176.126.103.184:41166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:01.570887 sshd[2393]: Connection closed by authenticating user root 176.126.103.184 port 41166 [preauth] Jan 16 21:08:01.569000 audit[2393]: USER_ERR pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:01.575601 systemd[1]: sshd@49-64.23.236.65:22-176.126.103.184:41166.service: Deactivated successfully. Jan 16 21:08:01.576301 kernel: audit: type=1109 audit(1768597681.569:332): pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:01.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-64.23.236.65:22-176.126.103.184:41166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:01.580990 kernel: audit: type=1131 audit(1768597681.574:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-64.23.236.65:22-176.126.103.184:41166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:01.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-64.23.236.65:22-176.126.103.184:41178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:01.788385 systemd[1]: Started sshd@50-64.23.236.65:22-176.126.103.184:41178.service - OpenSSH per-connection server daemon (176.126.103.184:41178). Jan 16 21:08:01.794994 kernel: audit: type=1130 audit(1768597681.786:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-64.23.236.65:22-176.126.103.184:41178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:02.610464 sshd[2399]: Connection closed by authenticating user root 176.126.103.184 port 41178 [preauth] Jan 16 21:08:02.609000 audit[2399]: USER_ERR pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:02.615477 systemd[1]: sshd@50-64.23.236.65:22-176.126.103.184:41178.service: Deactivated successfully. Jan 16 21:08:02.616045 kernel: audit: type=1109 audit(1768597682.609:335): pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:02.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-64.23.236.65:22-176.126.103.184:41178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:02.619988 kernel: audit: type=1131 audit(1768597682.615:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-64.23.236.65:22-176.126.103.184:41178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:02.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-64.23.236.65:22-176.126.103.184:42226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:02.815638 systemd[1]: Started sshd@51-64.23.236.65:22-176.126.103.184:42226.service - OpenSSH per-connection server daemon (176.126.103.184:42226). Jan 16 21:08:02.820992 kernel: audit: type=1130 audit(1768597682.814:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-64.23.236.65:22-176.126.103.184:42226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:03.614565 sshd[2405]: Connection closed by authenticating user root 176.126.103.184 port 42226 [preauth] Jan 16 21:08:03.613000 audit[2405]: USER_ERR pid=2405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:03.618976 kernel: audit: type=1109 audit(1768597683.613:338): pid=2405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:03.617444 systemd[1]: sshd@51-64.23.236.65:22-176.126.103.184:42226.service: Deactivated successfully. Jan 16 21:08:03.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-64.23.236.65:22-176.126.103.184:42226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:03.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-64.23.236.65:22-176.126.103.184:42228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:03.811725 systemd[1]: Started sshd@52-64.23.236.65:22-176.126.103.184:42228.service - OpenSSH per-connection server daemon (176.126.103.184:42228). Jan 16 21:08:04.614742 sshd[2411]: Connection closed by authenticating user root 176.126.103.184 port 42228 [preauth] Jan 16 21:08:04.613000 audit[2411]: USER_ERR pid=2411 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:04.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-64.23.236.65:22-176.126.103.184:42228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:04.616471 systemd[1]: sshd@52-64.23.236.65:22-176.126.103.184:42228.service: Deactivated successfully. Jan 16 21:08:04.821202 systemd[1]: Started sshd@53-64.23.236.65:22-176.126.103.184:42236.service - OpenSSH per-connection server daemon (176.126.103.184:42236). Jan 16 21:08:04.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-64.23.236.65:22-176.126.103.184:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:05.616004 sshd[2417]: Connection closed by authenticating user root 176.126.103.184 port 42236 [preauth] Jan 16 21:08:05.619465 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:05.619542 kernel: audit: type=1109 audit(1768597685.615:344): pid=2417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:05.615000 audit[2417]: USER_ERR pid=2417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:05.618449 systemd[1]: sshd@53-64.23.236.65:22-176.126.103.184:42236.service: Deactivated successfully. Jan 16 21:08:05.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-64.23.236.65:22-176.126.103.184:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:05.626998 kernel: audit: type=1131 audit(1768597685.617:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-64.23.236.65:22-176.126.103.184:42236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:05.819798 systemd[1]: Started sshd@54-64.23.236.65:22-176.126.103.184:42238.service - OpenSSH per-connection server daemon (176.126.103.184:42238). Jan 16 21:08:05.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-64.23.236.65:22-176.126.103.184:42238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:05.825123 kernel: audit: type=1130 audit(1768597685.819:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-64.23.236.65:22-176.126.103.184:42238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:06.612026 sshd[2423]: Connection closed by authenticating user root 176.126.103.184 port 42238 [preauth] Jan 16 21:08:06.611000 audit[2423]: USER_ERR pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:06.617984 kernel: audit: type=1109 audit(1768597686.611:347): pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:06.618974 systemd[1]: sshd@54-64.23.236.65:22-176.126.103.184:42238.service: Deactivated successfully. Jan 16 21:08:06.623337 kernel: audit: type=1131 audit(1768597686.618:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-64.23.236.65:22-176.126.103.184:42238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:06.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-64.23.236.65:22-176.126.103.184:42238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:06.820930 systemd[1]: Started sshd@55-64.23.236.65:22-176.126.103.184:42242.service - OpenSSH per-connection server daemon (176.126.103.184:42242). Jan 16 21:08:06.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-64.23.236.65:22-176.126.103.184:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:06.826129 kernel: audit: type=1130 audit(1768597686.820:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-64.23.236.65:22-176.126.103.184:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:07.647006 sshd[2429]: Connection closed by authenticating user root 176.126.103.184 port 42242 [preauth] Jan 16 21:08:07.646000 audit[2429]: USER_ERR pid=2429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:07.650382 systemd[1]: sshd@55-64.23.236.65:22-176.126.103.184:42242.service: Deactivated successfully. Jan 16 21:08:07.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-64.23.236.65:22-176.126.103.184:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:07.653511 kernel: audit: type=1109 audit(1768597687.646:350): pid=2429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:07.653576 kernel: audit: type=1131 audit(1768597687.649:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-64.23.236.65:22-176.126.103.184:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:07.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-64.23.236.65:22-176.126.103.184:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:07.853358 systemd[1]: Started sshd@56-64.23.236.65:22-176.126.103.184:42252.service - OpenSSH per-connection server daemon (176.126.103.184:42252). Jan 16 21:08:07.860048 kernel: audit: type=1130 audit(1768597687.852:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-64.23.236.65:22-176.126.103.184:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:08.658587 sshd[2435]: Connection closed by authenticating user root 176.126.103.184 port 42252 [preauth] Jan 16 21:08:08.658000 audit[2435]: USER_ERR pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:08.661391 systemd[1]: sshd@56-64.23.236.65:22-176.126.103.184:42252.service: Deactivated successfully. Jan 16 21:08:08.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-64.23.236.65:22-176.126.103.184:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:08.663977 kernel: audit: type=1109 audit(1768597688.658:353): pid=2435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:08.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-64.23.236.65:22-176.126.103.184:42260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:08.853302 systemd[1]: Started sshd@57-64.23.236.65:22-176.126.103.184:42260.service - OpenSSH per-connection server daemon (176.126.103.184:42260). Jan 16 21:08:09.626004 sshd[2441]: Connection closed by authenticating user root 176.126.103.184 port 42260 [preauth] Jan 16 21:08:09.624000 audit[2441]: USER_ERR pid=2441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:09.628976 systemd[1]: sshd@57-64.23.236.65:22-176.126.103.184:42260.service: Deactivated successfully. Jan 16 21:08:09.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-64.23.236.65:22-176.126.103.184:42260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:09.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-64.23.236.65:22-176.126.103.184:42266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:09.845721 systemd[1]: Started sshd@58-64.23.236.65:22-176.126.103.184:42266.service - OpenSSH per-connection server daemon (176.126.103.184:42266). Jan 16 21:08:10.653368 sshd[2447]: Connection closed by authenticating user root 176.126.103.184 port 42266 [preauth] Jan 16 21:08:10.657999 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:10.658171 kernel: audit: type=1109 audit(1768597690.653:359): pid=2447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:10.653000 audit[2447]: USER_ERR pid=2447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:10.659648 systemd[1]: sshd@58-64.23.236.65:22-176.126.103.184:42266.service: Deactivated successfully. Jan 16 21:08:10.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-64.23.236.65:22-176.126.103.184:42266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:10.666000 kernel: audit: type=1131 audit(1768597690.658:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-64.23.236.65:22-176.126.103.184:42266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:10.850314 systemd[1]: Started sshd@59-64.23.236.65:22-176.126.103.184:42280.service - OpenSSH per-connection server daemon (176.126.103.184:42280). Jan 16 21:08:10.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-64.23.236.65:22-176.126.103.184:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:10.855010 kernel: audit: type=1130 audit(1768597690.849:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-64.23.236.65:22-176.126.103.184:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:11.648996 sshd[2453]: Connection closed by authenticating user root 176.126.103.184 port 42280 [preauth] Jan 16 21:08:11.653984 kernel: audit: type=1109 audit(1768597691.648:362): pid=2453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:11.648000 audit[2453]: USER_ERR pid=2453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:11.652437 systemd[1]: sshd@59-64.23.236.65:22-176.126.103.184:42280.service: Deactivated successfully. Jan 16 21:08:11.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-64.23.236.65:22-176.126.103.184:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:11.659019 kernel: audit: type=1131 audit(1768597691.650:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-64.23.236.65:22-176.126.103.184:42280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:11.849334 systemd[1]: Started sshd@60-64.23.236.65:22-176.126.103.184:42292.service - OpenSSH per-connection server daemon (176.126.103.184:42292). Jan 16 21:08:11.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-64.23.236.65:22-176.126.103.184:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:11.855022 kernel: audit: type=1130 audit(1768597691.848:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-64.23.236.65:22-176.126.103.184:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:12.626990 sshd[2459]: Connection closed by authenticating user root 176.126.103.184 port 42292 [preauth] Jan 16 21:08:12.626000 audit[2459]: USER_ERR pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:12.632997 kernel: audit: type=1109 audit(1768597692.626:365): pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:12.634435 systemd[1]: sshd@60-64.23.236.65:22-176.126.103.184:42292.service: Deactivated successfully. Jan 16 21:08:12.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-64.23.236.65:22-176.126.103.184:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:12.639029 kernel: audit: type=1131 audit(1768597692.633:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-64.23.236.65:22-176.126.103.184:42292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:12.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-64.23.236.65:22-176.126.103.184:57774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:12.840885 systemd[1]: Started sshd@61-64.23.236.65:22-176.126.103.184:57774.service - OpenSSH per-connection server daemon (176.126.103.184:57774). Jan 16 21:08:12.845995 kernel: audit: type=1130 audit(1768597692.840:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-64.23.236.65:22-176.126.103.184:57774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:13.646074 sshd[2465]: Connection closed by authenticating user root 176.126.103.184 port 57774 [preauth] Jan 16 21:08:13.657000 audit[2465]: USER_ERR pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:13.661154 systemd[1]: sshd@61-64.23.236.65:22-176.126.103.184:57774.service: Deactivated successfully. Jan 16 21:08:13.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-64.23.236.65:22-176.126.103.184:57774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:13.665007 kernel: audit: type=1109 audit(1768597693.657:368): pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:13.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-64.23.236.65:22-176.126.103.184:57780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:13.854403 systemd[1]: Started sshd@62-64.23.236.65:22-176.126.103.184:57780.service - OpenSSH per-connection server daemon (176.126.103.184:57780). Jan 16 21:08:14.665240 sshd[2471]: Connection closed by authenticating user root 176.126.103.184 port 57780 [preauth] Jan 16 21:08:14.664000 audit[2471]: USER_ERR pid=2471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:14.668069 systemd[1]: sshd@62-64.23.236.65:22-176.126.103.184:57780.service: Deactivated successfully. Jan 16 21:08:14.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-64.23.236.65:22-176.126.103.184:57780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:14.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-64.23.236.65:22-176.126.103.184:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:14.867131 systemd[1]: Started sshd@63-64.23.236.65:22-176.126.103.184:57784.service - OpenSSH per-connection server daemon (176.126.103.184:57784). Jan 16 21:08:15.658350 sshd[2477]: Connection closed by authenticating user root 176.126.103.184 port 57784 [preauth] Jan 16 21:08:15.661781 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:15.662050 kernel: audit: type=1109 audit(1768597695.658:374): pid=2477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:15.658000 audit[2477]: USER_ERR pid=2477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:15.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-64.23.236.65:22-176.126.103.184:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:15.665576 systemd[1]: sshd@63-64.23.236.65:22-176.126.103.184:57784.service: Deactivated successfully. Jan 16 21:08:15.670010 kernel: audit: type=1131 audit(1768597695.664:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-64.23.236.65:22-176.126.103.184:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:15.850198 systemd[1]: Started sshd@64-64.23.236.65:22-176.126.103.184:57796.service - OpenSSH per-connection server daemon (176.126.103.184:57796). Jan 16 21:08:15.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-64.23.236.65:22-176.126.103.184:57796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:15.855189 kernel: audit: type=1130 audit(1768597695.849:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-64.23.236.65:22-176.126.103.184:57796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:16.637731 sshd[2483]: Connection closed by authenticating user root 176.126.103.184 port 57796 [preauth] Jan 16 21:08:16.637000 audit[2483]: USER_ERR pid=2483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:16.642007 kernel: audit: type=1109 audit(1768597696.637:377): pid=2483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:16.644369 systemd[1]: sshd@64-64.23.236.65:22-176.126.103.184:57796.service: Deactivated successfully. Jan 16 21:08:16.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-64.23.236.65:22-176.126.103.184:57796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:16.650009 kernel: audit: type=1131 audit(1768597696.643:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-64.23.236.65:22-176.126.103.184:57796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:16.848632 systemd[1]: Started sshd@65-64.23.236.65:22-176.126.103.184:57808.service - OpenSSH per-connection server daemon (176.126.103.184:57808). Jan 16 21:08:16.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-64.23.236.65:22-176.126.103.184:57808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:16.853987 kernel: audit: type=1130 audit(1768597696.848:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-64.23.236.65:22-176.126.103.184:57808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:17.649664 sshd[2489]: Connection closed by authenticating user root 176.126.103.184 port 57808 [preauth] Jan 16 21:08:17.648000 audit[2489]: USER_ERR pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:17.651959 systemd[1]: sshd@65-64.23.236.65:22-176.126.103.184:57808.service: Deactivated successfully. Jan 16 21:08:17.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-64.23.236.65:22-176.126.103.184:57808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:17.656356 kernel: audit: type=1109 audit(1768597697.648:380): pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:17.656427 kernel: audit: type=1131 audit(1768597697.652:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-64.23.236.65:22-176.126.103.184:57808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:17.849876 systemd[1]: Started sshd@66-64.23.236.65:22-176.126.103.184:57812.service - OpenSSH per-connection server daemon (176.126.103.184:57812). Jan 16 21:08:17.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-64.23.236.65:22-176.126.103.184:57812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:17.856020 kernel: audit: type=1130 audit(1768597697.849:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-64.23.236.65:22-176.126.103.184:57812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:18.650789 sshd[2495]: Connection closed by authenticating user root 176.126.103.184 port 57812 [preauth] Jan 16 21:08:18.650000 audit[2495]: USER_ERR pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:18.655987 kernel: audit: type=1109 audit(1768597698.650:383): pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:18.657036 systemd[1]: sshd@66-64.23.236.65:22-176.126.103.184:57812.service: Deactivated successfully. Jan 16 21:08:18.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-64.23.236.65:22-176.126.103.184:57812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:18.862985 systemd[1]: Started sshd@67-64.23.236.65:22-176.126.103.184:57814.service - OpenSSH per-connection server daemon (176.126.103.184:57814). Jan 16 21:08:18.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-64.23.236.65:22-176.126.103.184:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:19.679553 sshd[2501]: Connection closed by authenticating user root 176.126.103.184 port 57814 [preauth] Jan 16 21:08:19.679000 audit[2501]: USER_ERR pid=2501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:19.682068 systemd[1]: sshd@67-64.23.236.65:22-176.126.103.184:57814.service: Deactivated successfully. Jan 16 21:08:19.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-64.23.236.65:22-176.126.103.184:57814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:19.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-64.23.236.65:22-176.126.103.184:57830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:19.879554 systemd[1]: Started sshd@68-64.23.236.65:22-176.126.103.184:57830.service - OpenSSH per-connection server daemon (176.126.103.184:57830). Jan 16 21:08:20.678185 sshd[2507]: Connection closed by authenticating user root 176.126.103.184 port 57830 [preauth] Jan 16 21:08:20.683528 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:20.683578 kernel: audit: type=1109 audit(1768597700.677:389): pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:20.677000 audit[2507]: USER_ERR pid=2507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:20.685356 systemd[1]: sshd@68-64.23.236.65:22-176.126.103.184:57830.service: Deactivated successfully. Jan 16 21:08:20.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-64.23.236.65:22-176.126.103.184:57830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:20.689994 kernel: audit: type=1131 audit(1768597700.684:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-64.23.236.65:22-176.126.103.184:57830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:20.892085 systemd[1]: Started sshd@69-64.23.236.65:22-176.126.103.184:57838.service - OpenSSH per-connection server daemon (176.126.103.184:57838). Jan 16 21:08:20.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-64.23.236.65:22-176.126.103.184:57838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:20.897047 kernel: audit: type=1130 audit(1768597700.891:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-64.23.236.65:22-176.126.103.184:57838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:21.708143 sshd[2513]: Connection closed by authenticating user root 176.126.103.184 port 57838 [preauth] Jan 16 21:08:21.707000 audit[2513]: USER_ERR pid=2513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:21.714005 kernel: audit: type=1109 audit(1768597701.707:392): pid=2513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:21.715592 systemd[1]: sshd@69-64.23.236.65:22-176.126.103.184:57838.service: Deactivated successfully. Jan 16 21:08:21.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-64.23.236.65:22-176.126.103.184:57838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:21.720981 kernel: audit: type=1131 audit(1768597701.715:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-64.23.236.65:22-176.126.103.184:57838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:21.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-64.23.236.65:22-176.126.103.184:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:21.910349 systemd[1]: Started sshd@70-64.23.236.65:22-176.126.103.184:57842.service - OpenSSH per-connection server daemon (176.126.103.184:57842). Jan 16 21:08:21.916000 kernel: audit: type=1130 audit(1768597701.909:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-64.23.236.65:22-176.126.103.184:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:22.712000 audit[2519]: USER_ERR pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:22.714163 sshd[2519]: Connection closed by authenticating user root 176.126.103.184 port 57842 [preauth] Jan 16 21:08:22.717013 systemd[1]: sshd@70-64.23.236.65:22-176.126.103.184:57842.service: Deactivated successfully. Jan 16 21:08:22.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-64.23.236.65:22-176.126.103.184:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:22.719749 kernel: audit: type=1109 audit(1768597702.712:395): pid=2519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:22.719831 kernel: audit: type=1131 audit(1768597702.716:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-64.23.236.65:22-176.126.103.184:57842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:22.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-64.23.236.65:22-176.126.103.184:51410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:22.926296 systemd[1]: Started sshd@71-64.23.236.65:22-176.126.103.184:51410.service - OpenSSH per-connection server daemon (176.126.103.184:51410). Jan 16 21:08:22.931110 kernel: audit: type=1130 audit(1768597702.925:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-64.23.236.65:22-176.126.103.184:51410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:23.730524 sshd[2525]: Connection closed by authenticating user root 176.126.103.184 port 51410 [preauth] Jan 16 21:08:23.730000 audit[2525]: USER_ERR pid=2525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:23.732826 systemd[1]: sshd@71-64.23.236.65:22-176.126.103.184:51410.service: Deactivated successfully. Jan 16 21:08:23.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-64.23.236.65:22-176.126.103.184:51410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:23.736077 kernel: audit: type=1109 audit(1768597703.730:398): pid=2525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:23.937575 systemd[1]: Started sshd@72-64.23.236.65:22-176.126.103.184:51428.service - OpenSSH per-connection server daemon (176.126.103.184:51428). Jan 16 21:08:23.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-64.23.236.65:22-176.126.103.184:51428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:24.723656 sshd[2531]: Connection closed by authenticating user root 176.126.103.184 port 51428 [preauth] Jan 16 21:08:24.722000 audit[2531]: USER_ERR pid=2531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:24.726024 systemd[1]: sshd@72-64.23.236.65:22-176.126.103.184:51428.service: Deactivated successfully. Jan 16 21:08:24.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-64.23.236.65:22-176.126.103.184:51428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:24.916056 systemd[1]: Started sshd@73-64.23.236.65:22-176.126.103.184:51444.service - OpenSSH per-connection server daemon (176.126.103.184:51444). Jan 16 21:08:24.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-64.23.236.65:22-176.126.103.184:51444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:25.693693 sshd[2537]: Connection closed by authenticating user root 176.126.103.184 port 51444 [preauth] Jan 16 21:08:25.696037 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:25.696088 kernel: audit: type=1109 audit(1768597705.693:404): pid=2537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:25.693000 audit[2537]: USER_ERR pid=2537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:25.697850 systemd[1]: sshd@73-64.23.236.65:22-176.126.103.184:51444.service: Deactivated successfully. Jan 16 21:08:25.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-64.23.236.65:22-176.126.103.184:51444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:25.701335 kernel: audit: type=1131 audit(1768597705.696:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-64.23.236.65:22-176.126.103.184:51444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:25.905537 systemd[1]: Started sshd@74-64.23.236.65:22-176.126.103.184:51454.service - OpenSSH per-connection server daemon (176.126.103.184:51454). Jan 16 21:08:25.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-64.23.236.65:22-176.126.103.184:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:25.910420 kernel: audit: type=1130 audit(1768597705.903:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-64.23.236.65:22-176.126.103.184:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:26.718569 sshd[2543]: Connection closed by authenticating user root 176.126.103.184 port 51454 [preauth] Jan 16 21:08:26.716000 audit[2543]: USER_ERR pid=2543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:26.722988 kernel: audit: type=1109 audit(1768597706.716:407): pid=2543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:26.723373 systemd[1]: sshd@74-64.23.236.65:22-176.126.103.184:51454.service: Deactivated successfully. Jan 16 21:08:26.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-64.23.236.65:22-176.126.103.184:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:26.728032 kernel: audit: type=1131 audit(1768597706.721:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-64.23.236.65:22-176.126.103.184:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:26.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-64.23.236.65:22-176.126.103.184:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:26.929627 systemd[1]: Started sshd@75-64.23.236.65:22-176.126.103.184:51464.service - OpenSSH per-connection server daemon (176.126.103.184:51464). Jan 16 21:08:26.933989 kernel: audit: type=1130 audit(1768597706.927:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-64.23.236.65:22-176.126.103.184:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:27.717854 sshd[2549]: Connection closed by authenticating user root 176.126.103.184 port 51464 [preauth] Jan 16 21:08:27.717000 audit[2549]: USER_ERR pid=2549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:27.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-64.23.236.65:22-176.126.103.184:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:27.722583 systemd[1]: sshd@75-64.23.236.65:22-176.126.103.184:51464.service: Deactivated successfully. Jan 16 21:08:27.724664 kernel: audit: type=1109 audit(1768597707.717:410): pid=2549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:27.724743 kernel: audit: type=1131 audit(1768597707.721:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-64.23.236.65:22-176.126.103.184:51464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:27.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-64.23.236.65:22-176.126.103.184:51476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:27.925304 systemd[1]: Started sshd@76-64.23.236.65:22-176.126.103.184:51476.service - OpenSSH per-connection server daemon (176.126.103.184:51476). Jan 16 21:08:27.931029 kernel: audit: type=1130 audit(1768597707.924:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-64.23.236.65:22-176.126.103.184:51476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:28.730202 sshd[2555]: Connection closed by authenticating user root 176.126.103.184 port 51476 [preauth] Jan 16 21:08:28.729000 audit[2555]: USER_ERR pid=2555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:28.736994 kernel: audit: type=1109 audit(1768597708.729:413): pid=2555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:28.737916 systemd[1]: sshd@76-64.23.236.65:22-176.126.103.184:51476.service: Deactivated successfully. Jan 16 21:08:28.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-64.23.236.65:22-176.126.103.184:51476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:28.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-64.23.236.65:22-176.126.103.184:51486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:28.927851 systemd[1]: Started sshd@77-64.23.236.65:22-176.126.103.184:51486.service - OpenSSH per-connection server daemon (176.126.103.184:51486). Jan 16 21:08:29.739200 sshd[2561]: Connection closed by authenticating user root 176.126.103.184 port 51486 [preauth] Jan 16 21:08:29.738000 audit[2561]: USER_ERR pid=2561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:29.742125 systemd[1]: sshd@77-64.23.236.65:22-176.126.103.184:51486.service: Deactivated successfully. Jan 16 21:08:29.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-64.23.236.65:22-176.126.103.184:51486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:29.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-64.23.236.65:22-176.126.103.184:51488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:29.940814 systemd[1]: Started sshd@78-64.23.236.65:22-176.126.103.184:51488.service - OpenSSH per-connection server daemon (176.126.103.184:51488). Jan 16 21:08:30.739394 sshd[2567]: Connection closed by authenticating user root 176.126.103.184 port 51488 [preauth] Jan 16 21:08:30.738000 audit[2567]: USER_ERR pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:30.740160 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:30.740195 kernel: audit: type=1109 audit(1768597710.738:419): pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:30.746186 systemd[1]: sshd@78-64.23.236.65:22-176.126.103.184:51488.service: Deactivated successfully. Jan 16 21:08:30.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-64.23.236.65:22-176.126.103.184:51488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:30.751119 kernel: audit: type=1131 audit(1768597710.746:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-64.23.236.65:22-176.126.103.184:51488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:30.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-64.23.236.65:22-176.126.103.184:51500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:30.955769 systemd[1]: Started sshd@79-64.23.236.65:22-176.126.103.184:51500.service - OpenSSH per-connection server daemon (176.126.103.184:51500). Jan 16 21:08:30.960977 kernel: audit: type=1130 audit(1768597710.954:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-64.23.236.65:22-176.126.103.184:51500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:31.766631 sshd[2573]: Connection closed by authenticating user root 176.126.103.184 port 51500 [preauth] Jan 16 21:08:31.765000 audit[2573]: USER_ERR pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:31.771031 kernel: audit: type=1109 audit(1768597711.765:422): pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:31.771117 kernel: audit: type=1131 audit(1768597711.767:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-64.23.236.65:22-176.126.103.184:51500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:31.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-64.23.236.65:22-176.126.103.184:51500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:31.769784 systemd[1]: sshd@79-64.23.236.65:22-176.126.103.184:51500.service: Deactivated successfully. Jan 16 21:08:31.979932 systemd[1]: Started sshd@80-64.23.236.65:22-176.126.103.184:51504.service - OpenSSH per-connection server daemon (176.126.103.184:51504). Jan 16 21:08:31.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-64.23.236.65:22-176.126.103.184:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:31.985312 kernel: audit: type=1130 audit(1768597711.979:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-64.23.236.65:22-176.126.103.184:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:32.789100 sshd[2579]: Connection closed by authenticating user root 176.126.103.184 port 51504 [preauth] Jan 16 21:08:32.788000 audit[2579]: USER_ERR pid=2579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:32.795084 kernel: audit: type=1109 audit(1768597712.788:425): pid=2579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:32.795778 systemd[1]: sshd@80-64.23.236.65:22-176.126.103.184:51504.service: Deactivated successfully. Jan 16 21:08:32.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-64.23.236.65:22-176.126.103.184:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:32.800973 kernel: audit: type=1131 audit(1768597712.795:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-64.23.236.65:22-176.126.103.184:51504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:33.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-64.23.236.65:22-176.126.103.184:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:33.000883 systemd[1]: Started sshd@81-64.23.236.65:22-176.126.103.184:37292.service - OpenSSH per-connection server daemon (176.126.103.184:37292). Jan 16 21:08:33.007345 kernel: audit: type=1130 audit(1768597713.000:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-64.23.236.65:22-176.126.103.184:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:33.818739 sshd[2585]: Connection closed by authenticating user root 176.126.103.184 port 37292 [preauth] Jan 16 21:08:33.818000 audit[2585]: USER_ERR pid=2585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:33.823619 systemd[1]: sshd@81-64.23.236.65:22-176.126.103.184:37292.service: Deactivated successfully. Jan 16 21:08:33.825325 kernel: audit: type=1109 audit(1768597713.818:428): pid=2585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:33.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-64.23.236.65:22-176.126.103.184:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:34.019662 systemd[1]: Started sshd@82-64.23.236.65:22-176.126.103.184:37302.service - OpenSSH per-connection server daemon (176.126.103.184:37302). Jan 16 21:08:34.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-64.23.236.65:22-176.126.103.184:37302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:34.818450 sshd[2591]: Connection closed by authenticating user root 176.126.103.184 port 37302 [preauth] Jan 16 21:08:34.818000 audit[2591]: USER_ERR pid=2591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:34.821503 systemd[1]: sshd@82-64.23.236.65:22-176.126.103.184:37302.service: Deactivated successfully. Jan 16 21:08:34.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-64.23.236.65:22-176.126.103.184:37302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:35.013750 systemd[1]: Started sshd@83-64.23.236.65:22-176.126.103.184:37308.service - OpenSSH per-connection server daemon (176.126.103.184:37308). Jan 16 21:08:35.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-64.23.236.65:22-176.126.103.184:37308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:35.803408 sshd[2597]: Connection closed by authenticating user root 176.126.103.184 port 37308 [preauth] Jan 16 21:08:35.802000 audit[2597]: USER_ERR pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:35.804219 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:35.804284 kernel: audit: type=1109 audit(1768597715.802:434): pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:35.810083 systemd[1]: sshd@83-64.23.236.65:22-176.126.103.184:37308.service: Deactivated successfully. Jan 16 21:08:35.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-64.23.236.65:22-176.126.103.184:37308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:35.814979 kernel: audit: type=1131 audit(1768597715.809:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-64.23.236.65:22-176.126.103.184:37308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:36.014495 systemd[1]: Started sshd@84-64.23.236.65:22-176.126.103.184:37314.service - OpenSSH per-connection server daemon (176.126.103.184:37314). Jan 16 21:08:36.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-64.23.236.65:22-176.126.103.184:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:36.020058 kernel: audit: type=1130 audit(1768597716.013:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-64.23.236.65:22-176.126.103.184:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:36.824162 sshd[2603]: Connection closed by authenticating user root 176.126.103.184 port 37314 [preauth] Jan 16 21:08:36.823000 audit[2603]: USER_ERR pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:36.827930 systemd[1]: sshd@84-64.23.236.65:22-176.126.103.184:37314.service: Deactivated successfully. Jan 16 21:08:36.829024 kernel: audit: type=1109 audit(1768597716.823:437): pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:36.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-64.23.236.65:22-176.126.103.184:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:36.833997 kernel: audit: type=1131 audit(1768597716.825:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-64.23.236.65:22-176.126.103.184:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:37.039784 systemd[1]: Started sshd@85-64.23.236.65:22-176.126.103.184:37328.service - OpenSSH per-connection server daemon (176.126.103.184:37328). Jan 16 21:08:37.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-64.23.236.65:22-176.126.103.184:37328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:37.045992 kernel: audit: type=1130 audit(1768597717.039:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-64.23.236.65:22-176.126.103.184:37328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:37.852570 sshd[2609]: Connection closed by authenticating user root 176.126.103.184 port 37328 [preauth] Jan 16 21:08:37.851000 audit[2609]: USER_ERR pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:37.856476 systemd[1]: sshd@85-64.23.236.65:22-176.126.103.184:37328.service: Deactivated successfully. Jan 16 21:08:37.856994 kernel: audit: type=1109 audit(1768597717.851:440): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:37.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-64.23.236.65:22-176.126.103.184:37328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:37.861099 kernel: audit: type=1131 audit(1768597717.856:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-64.23.236.65:22-176.126.103.184:37328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:38.052644 systemd[1]: Started sshd@86-64.23.236.65:22-176.126.103.184:37330.service - OpenSSH per-connection server daemon (176.126.103.184:37330). Jan 16 21:08:38.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-64.23.236.65:22-176.126.103.184:37330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:38.058982 kernel: audit: type=1130 audit(1768597718.052:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-64.23.236.65:22-176.126.103.184:37330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:38.860094 sshd[2615]: Connection closed by authenticating user root 176.126.103.184 port 37330 [preauth] Jan 16 21:08:38.859000 audit[2615]: USER_ERR pid=2615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:38.865044 kernel: audit: type=1109 audit(1768597718.859:443): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:38.865362 systemd[1]: sshd@86-64.23.236.65:22-176.126.103.184:37330.service: Deactivated successfully. Jan 16 21:08:38.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-64.23.236.65:22-176.126.103.184:37330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:39.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-64.23.236.65:22-176.126.103.184:37334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:39.064187 systemd[1]: Started sshd@87-64.23.236.65:22-176.126.103.184:37334.service - OpenSSH per-connection server daemon (176.126.103.184:37334). Jan 16 21:08:39.865708 sshd[2621]: Connection closed by authenticating user root 176.126.103.184 port 37334 [preauth] Jan 16 21:08:39.864000 audit[2621]: USER_ERR pid=2621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:39.868454 systemd[1]: sshd@87-64.23.236.65:22-176.126.103.184:37334.service: Deactivated successfully. Jan 16 21:08:39.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-64.23.236.65:22-176.126.103.184:37334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:40.073421 systemd[1]: Started sshd@88-64.23.236.65:22-176.126.103.184:37338.service - OpenSSH per-connection server daemon (176.126.103.184:37338). Jan 16 21:08:40.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-64.23.236.65:22-176.126.103.184:37338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:40.894070 sshd[2627]: Connection closed by authenticating user root 176.126.103.184 port 37338 [preauth] Jan 16 21:08:40.897869 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:40.897991 kernel: audit: type=1109 audit(1768597720.893:449): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:40.893000 audit[2627]: USER_ERR pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:40.897568 systemd[1]: sshd@88-64.23.236.65:22-176.126.103.184:37338.service: Deactivated successfully. Jan 16 21:08:40.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-64.23.236.65:22-176.126.103.184:37338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:40.907999 kernel: audit: type=1131 audit(1768597720.895:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-64.23.236.65:22-176.126.103.184:37338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:41.097201 systemd[1]: Started sshd@89-64.23.236.65:22-176.126.103.184:37342.service - OpenSSH per-connection server daemon (176.126.103.184:37342). Jan 16 21:08:41.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-64.23.236.65:22-176.126.103.184:37342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:41.102013 kernel: audit: type=1130 audit(1768597721.096:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-64.23.236.65:22-176.126.103.184:37342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:41.899001 sshd[2633]: Connection closed by authenticating user root 176.126.103.184 port 37342 [preauth] Jan 16 21:08:41.898000 audit[2633]: USER_ERR pid=2633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:41.903989 kernel: audit: type=1109 audit(1768597721.898:452): pid=2633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:41.904492 systemd[1]: sshd@89-64.23.236.65:22-176.126.103.184:37342.service: Deactivated successfully. Jan 16 21:08:41.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-64.23.236.65:22-176.126.103.184:37342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:41.910996 kernel: audit: type=1131 audit(1768597721.903:453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-64.23.236.65:22-176.126.103.184:37342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:42.100506 systemd[1]: Started sshd@90-64.23.236.65:22-176.126.103.184:37350.service - OpenSSH per-connection server daemon (176.126.103.184:37350). Jan 16 21:08:42.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-64.23.236.65:22-176.126.103.184:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:42.106229 kernel: audit: type=1130 audit(1768597722.100:454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-64.23.236.65:22-176.126.103.184:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:42.887038 sshd[2639]: Connection closed by authenticating user root 176.126.103.184 port 37350 [preauth] Jan 16 21:08:42.886000 audit[2639]: USER_ERR pid=2639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:42.891581 systemd[1]: sshd@90-64.23.236.65:22-176.126.103.184:37350.service: Deactivated successfully. Jan 16 21:08:42.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-64.23.236.65:22-176.126.103.184:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:42.894825 kernel: audit: type=1109 audit(1768597722.886:455): pid=2639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:42.894917 kernel: audit: type=1131 audit(1768597722.890:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-64.23.236.65:22-176.126.103.184:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:43.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-64.23.236.65:22-176.126.103.184:34858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:43.094715 systemd[1]: Started sshd@91-64.23.236.65:22-176.126.103.184:34858.service - OpenSSH per-connection server daemon (176.126.103.184:34858). Jan 16 21:08:43.100007 kernel: audit: type=1130 audit(1768597723.093:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-64.23.236.65:22-176.126.103.184:34858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:43.913000 audit[2645]: USER_ERR pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:43.915154 sshd[2645]: Connection closed by authenticating user root 176.126.103.184 port 34858 [preauth] Jan 16 21:08:43.918416 systemd[1]: sshd@91-64.23.236.65:22-176.126.103.184:34858.service: Deactivated successfully. Jan 16 21:08:43.919028 kernel: audit: type=1109 audit(1768597723.913:458): pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:43.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-64.23.236.65:22-176.126.103.184:34858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:44.938922 systemd[1]: Started sshd@92-64.23.236.65:22-176.126.103.184:34862.service - OpenSSH per-connection server daemon (176.126.103.184:34862). Jan 16 21:08:44.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-64.23.236.65:22-176.126.103.184:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:45.739688 sshd[2651]: Connection closed by authenticating user root 176.126.103.184 port 34862 [preauth] Jan 16 21:08:45.738000 audit[2651]: USER_ERR pid=2651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:45.742513 systemd[1]: sshd@92-64.23.236.65:22-176.126.103.184:34862.service: Deactivated successfully. Jan 16 21:08:45.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-64.23.236.65:22-176.126.103.184:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:45.940560 systemd[1]: Started sshd@93-64.23.236.65:22-176.126.103.184:34870.service - OpenSSH per-connection server daemon (176.126.103.184:34870). Jan 16 21:08:45.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-64.23.236.65:22-176.126.103.184:34870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:45.943972 kernel: kauditd_printk_skb: 4 callbacks suppressed Jan 16 21:08:45.944052 kernel: audit: type=1130 audit(1768597725.940:463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-64.23.236.65:22-176.126.103.184:34870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:46.736486 sshd[2657]: Connection closed by authenticating user root 176.126.103.184 port 34870 [preauth] Jan 16 21:08:46.735000 audit[2657]: USER_ERR pid=2657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:46.738718 systemd[1]: sshd@93-64.23.236.65:22-176.126.103.184:34870.service: Deactivated successfully. Jan 16 21:08:46.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-64.23.236.65:22-176.126.103.184:34870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:46.743483 kernel: audit: type=1109 audit(1768597726.735:464): pid=2657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:46.743582 kernel: audit: type=1131 audit(1768597726.738:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-64.23.236.65:22-176.126.103.184:34870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:46.945376 systemd[1]: Started sshd@94-64.23.236.65:22-176.126.103.184:34882.service - OpenSSH per-connection server daemon (176.126.103.184:34882). Jan 16 21:08:46.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-64.23.236.65:22-176.126.103.184:34882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:46.951092 kernel: audit: type=1130 audit(1768597726.944:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-64.23.236.65:22-176.126.103.184:34882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:47.755399 sshd[2663]: Connection closed by authenticating user root 176.126.103.184 port 34882 [preauth] Jan 16 21:08:47.755000 audit[2663]: USER_ERR pid=2663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:47.759981 kernel: audit: type=1109 audit(1768597727.755:467): pid=2663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:47.760281 systemd[1]: sshd@94-64.23.236.65:22-176.126.103.184:34882.service: Deactivated successfully. Jan 16 21:08:47.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-64.23.236.65:22-176.126.103.184:34882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:47.765979 kernel: audit: type=1131 audit(1768597727.759:468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-64.23.236.65:22-176.126.103.184:34882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:47.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-64.23.236.65:22-176.126.103.184:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:47.956082 systemd[1]: Started sshd@95-64.23.236.65:22-176.126.103.184:34888.service - OpenSSH per-connection server daemon (176.126.103.184:34888). Jan 16 21:08:47.961007 kernel: audit: type=1130 audit(1768597727.955:469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-64.23.236.65:22-176.126.103.184:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:48.751579 sshd[2669]: Connection closed by authenticating user root 176.126.103.184 port 34888 [preauth] Jan 16 21:08:48.751000 audit[2669]: USER_ERR pid=2669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:48.758015 kernel: audit: type=1109 audit(1768597728.751:470): pid=2669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:48.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-64.23.236.65:22-176.126.103.184:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:48.759065 systemd[1]: sshd@95-64.23.236.65:22-176.126.103.184:34888.service: Deactivated successfully. Jan 16 21:08:48.764042 kernel: audit: type=1131 audit(1768597728.758:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-64.23.236.65:22-176.126.103.184:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:48.965493 systemd[1]: Started sshd@96-64.23.236.65:22-176.126.103.184:34896.service - OpenSSH per-connection server daemon (176.126.103.184:34896). Jan 16 21:08:48.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-64.23.236.65:22-176.126.103.184:34896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:48.973088 kernel: audit: type=1130 audit(1768597728.965:472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-64.23.236.65:22-176.126.103.184:34896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:49.579507 sshd[2675]: Invalid user user from 176.126.103.184 port 34896 Jan 16 21:08:49.766339 sshd[2675]: Connection closed by invalid user user 176.126.103.184 port 34896 [preauth] Jan 16 21:08:49.765000 audit[2675]: USER_ERR pid=2675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:49.769317 systemd[1]: sshd@96-64.23.236.65:22-176.126.103.184:34896.service: Deactivated successfully. Jan 16 21:08:49.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-64.23.236.65:22-176.126.103.184:34896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:49.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-64.23.236.65:22-176.126.103.184:34912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:49.968268 systemd[1]: Started sshd@97-64.23.236.65:22-176.126.103.184:34912.service - OpenSSH per-connection server daemon (176.126.103.184:34912). Jan 16 21:08:50.584940 sshd[2681]: Invalid user user from 176.126.103.184 port 34912 Jan 16 21:08:50.775119 sshd[2681]: Connection closed by invalid user user 176.126.103.184 port 34912 [preauth] Jan 16 21:08:50.774000 audit[2681]: USER_ERR pid=2681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:50.778384 systemd[1]: sshd@97-64.23.236.65:22-176.126.103.184:34912.service: Deactivated successfully. Jan 16 21:08:50.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-64.23.236.65:22-176.126.103.184:34912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:50.984230 systemd[1]: Started sshd@98-64.23.236.65:22-176.126.103.184:34928.service - OpenSSH per-connection server daemon (176.126.103.184:34928). Jan 16 21:08:50.992307 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:50.992414 kernel: audit: type=1130 audit(1768597730.983:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-64.23.236.65:22-176.126.103.184:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:50.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-64.23.236.65:22-176.126.103.184:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:51.610305 sshd[2687]: Invalid user user from 176.126.103.184 port 34928 Jan 16 21:08:51.805134 sshd[2687]: Connection closed by invalid user user 176.126.103.184 port 34928 [preauth] Jan 16 21:08:51.804000 audit[2687]: USER_ERR pid=2687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:51.807901 systemd[1]: sshd@98-64.23.236.65:22-176.126.103.184:34928.service: Deactivated successfully. Jan 16 21:08:51.811084 kernel: audit: type=1109 audit(1768597731.804:479): pid=2687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:51.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-64.23.236.65:22-176.126.103.184:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:51.815146 kernel: audit: type=1131 audit(1768597731.807:480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-64.23.236.65:22-176.126.103.184:34928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:52.022746 systemd[1]: Started sshd@99-64.23.236.65:22-176.126.103.184:34942.service - OpenSSH per-connection server daemon (176.126.103.184:34942). Jan 16 21:08:52.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-64.23.236.65:22-176.126.103.184:34942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:52.029017 kernel: audit: type=1130 audit(1768597732.021:481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-64.23.236.65:22-176.126.103.184:34942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:52.649054 sshd[2693]: Invalid user user from 176.126.103.184 port 34942 Jan 16 21:08:52.842410 sshd[2693]: Connection closed by invalid user user 176.126.103.184 port 34942 [preauth] Jan 16 21:08:52.841000 audit[2693]: USER_ERR pid=2693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:52.845580 systemd[1]: sshd@99-64.23.236.65:22-176.126.103.184:34942.service: Deactivated successfully. Jan 16 21:08:52.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-64.23.236.65:22-176.126.103.184:34942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:52.848372 kernel: audit: type=1109 audit(1768597732.841:482): pid=2693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:52.848454 kernel: audit: type=1131 audit(1768597732.845:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-64.23.236.65:22-176.126.103.184:34942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:53.046984 systemd[1]: Started sshd@100-64.23.236.65:22-176.126.103.184:49630.service - OpenSSH per-connection server daemon (176.126.103.184:49630). Jan 16 21:08:53.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-64.23.236.65:22-176.126.103.184:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:53.051997 kernel: audit: type=1130 audit(1768597733.046:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-64.23.236.65:22-176.126.103.184:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:53.665163 sshd[2699]: Invalid user user from 176.126.103.184 port 49630 Jan 16 21:08:53.853011 sshd[2699]: Connection closed by invalid user user 176.126.103.184 port 49630 [preauth] Jan 16 21:08:53.852000 audit[2699]: USER_ERR pid=2699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:53.856499 systemd[1]: sshd@100-64.23.236.65:22-176.126.103.184:49630.service: Deactivated successfully. Jan 16 21:08:53.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-64.23.236.65:22-176.126.103.184:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:53.860403 kernel: audit: type=1109 audit(1768597733.852:485): pid=2699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:53.860529 kernel: audit: type=1131 audit(1768597733.855:486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-64.23.236.65:22-176.126.103.184:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:54.060489 systemd[1]: Started sshd@101-64.23.236.65:22-176.126.103.184:49636.service - OpenSSH per-connection server daemon (176.126.103.184:49636). Jan 16 21:08:54.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-64.23.236.65:22-176.126.103.184:49636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:54.065990 kernel: audit: type=1130 audit(1768597734.060:487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-64.23.236.65:22-176.126.103.184:49636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:54.687977 sshd[2705]: Invalid user user from 176.126.103.184 port 49636 Jan 16 21:08:54.884706 sshd[2705]: Connection closed by invalid user user 176.126.103.184 port 49636 [preauth] Jan 16 21:08:54.884000 audit[2705]: USER_ERR pid=2705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:54.887398 systemd[1]: sshd@101-64.23.236.65:22-176.126.103.184:49636.service: Deactivated successfully. Jan 16 21:08:54.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-64.23.236.65:22-176.126.103.184:49636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:55.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-64.23.236.65:22-176.126.103.184:49646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:55.090535 systemd[1]: Started sshd@102-64.23.236.65:22-176.126.103.184:49646.service - OpenSSH per-connection server daemon (176.126.103.184:49646). Jan 16 21:08:55.720573 sshd[2711]: Invalid user user from 176.126.103.184 port 49646 Jan 16 21:08:55.915081 sshd[2711]: Connection closed by invalid user user 176.126.103.184 port 49646 [preauth] Jan 16 21:08:55.914000 audit[2711]: USER_ERR pid=2711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:55.918043 systemd[1]: sshd@102-64.23.236.65:22-176.126.103.184:49646.service: Deactivated successfully. Jan 16 21:08:55.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-64.23.236.65:22-176.126.103.184:49646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:56.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-64.23.236.65:22-176.126.103.184:49658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:56.114906 systemd[1]: Started sshd@103-64.23.236.65:22-176.126.103.184:49658.service - OpenSSH per-connection server daemon (176.126.103.184:49658). Jan 16 21:08:56.117231 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:08:56.117269 kernel: audit: type=1130 audit(1768597736.114:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-64.23.236.65:22-176.126.103.184:49658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:56.729343 sshd[2717]: Invalid user user from 176.126.103.184 port 49658 Jan 16 21:08:56.917912 sshd[2717]: Connection closed by invalid user user 176.126.103.184 port 49658 [preauth] Jan 16 21:08:56.917000 audit[2717]: USER_ERR pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:56.921479 systemd[1]: sshd@103-64.23.236.65:22-176.126.103.184:49658.service: Deactivated successfully. Jan 16 21:08:56.923186 kernel: audit: type=1109 audit(1768597736.917:494): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:56.923251 kernel: audit: type=1131 audit(1768597736.919:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-64.23.236.65:22-176.126.103.184:49658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:56.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-64.23.236.65:22-176.126.103.184:49658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:57.116526 systemd[1]: Started sshd@104-64.23.236.65:22-176.126.103.184:49670.service - OpenSSH per-connection server daemon (176.126.103.184:49670). Jan 16 21:08:57.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-64.23.236.65:22-176.126.103.184:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:57.121110 kernel: audit: type=1130 audit(1768597737.115:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-64.23.236.65:22-176.126.103.184:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:57.711869 sshd[2723]: Invalid user user from 176.126.103.184 port 49670 Jan 16 21:08:57.894999 sshd[2723]: Connection closed by invalid user user 176.126.103.184 port 49670 [preauth] Jan 16 21:08:57.894000 audit[2723]: USER_ERR pid=2723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:57.898542 systemd[1]: sshd@104-64.23.236.65:22-176.126.103.184:49670.service: Deactivated successfully. Jan 16 21:08:57.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-64.23.236.65:22-176.126.103.184:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:57.901606 kernel: audit: type=1109 audit(1768597737.894:497): pid=2723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:57.901703 kernel: audit: type=1131 audit(1768597737.897:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-64.23.236.65:22-176.126.103.184:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:58.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-64.23.236.65:22-176.126.103.184:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:58.096687 systemd[1]: Started sshd@105-64.23.236.65:22-176.126.103.184:49674.service - OpenSSH per-connection server daemon (176.126.103.184:49674). Jan 16 21:08:58.102010 kernel: audit: type=1130 audit(1768597738.095:499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-64.23.236.65:22-176.126.103.184:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:58.716139 sshd[2729]: Invalid user user from 176.126.103.184 port 49674 Jan 16 21:08:58.901979 sshd[2729]: Connection closed by invalid user user 176.126.103.184 port 49674 [preauth] Jan 16 21:08:58.901000 audit[2729]: USER_ERR pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:58.908762 systemd[1]: sshd@105-64.23.236.65:22-176.126.103.184:49674.service: Deactivated successfully. Jan 16 21:08:58.909205 kernel: audit: type=1109 audit(1768597738.901:500): pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:58.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-64.23.236.65:22-176.126.103.184:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:58.916026 kernel: audit: type=1131 audit(1768597738.908:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-64.23.236.65:22-176.126.103.184:49674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:59.109212 systemd[1]: Started sshd@106-64.23.236.65:22-176.126.103.184:49688.service - OpenSSH per-connection server daemon (176.126.103.184:49688). Jan 16 21:08:59.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-64.23.236.65:22-176.126.103.184:49688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:59.116078 kernel: audit: type=1130 audit(1768597739.108:502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-64.23.236.65:22-176.126.103.184:49688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:08:59.733889 sshd[2735]: Invalid user user from 176.126.103.184 port 49688 Jan 16 21:08:59.925912 sshd[2735]: Connection closed by invalid user user 176.126.103.184 port 49688 [preauth] Jan 16 21:08:59.925000 audit[2735]: USER_ERR pid=2735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:08:59.928517 systemd[1]: sshd@106-64.23.236.65:22-176.126.103.184:49688.service: Deactivated successfully. Jan 16 21:08:59.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-64.23.236.65:22-176.126.103.184:49688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:00.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-64.23.236.65:22-176.126.103.184:49702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:00.135376 systemd[1]: Started sshd@107-64.23.236.65:22-176.126.103.184:49702.service - OpenSSH per-connection server daemon (176.126.103.184:49702). Jan 16 21:09:00.764156 sshd[2741]: Invalid user user from 176.126.103.184 port 49702 Jan 16 21:09:00.956983 sshd[2741]: Connection closed by invalid user user 176.126.103.184 port 49702 [preauth] Jan 16 21:09:00.956000 audit[2741]: USER_ERR pid=2741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:00.959389 systemd[1]: sshd@107-64.23.236.65:22-176.126.103.184:49702.service: Deactivated successfully. Jan 16 21:09:00.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-64.23.236.65:22-176.126.103.184:49702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:01.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-64.23.236.65:22-176.126.103.184:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:01.164328 systemd[1]: Started sshd@108-64.23.236.65:22-176.126.103.184:49714.service - OpenSSH per-connection server daemon (176.126.103.184:49714). Jan 16 21:09:01.165596 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:01.165665 kernel: audit: type=1130 audit(1768597741.163:508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-64.23.236.65:22-176.126.103.184:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:01.799027 sshd[2747]: Invalid user user from 176.126.103.184 port 49714 Jan 16 21:09:01.993364 sshd[2747]: Connection closed by invalid user user 176.126.103.184 port 49714 [preauth] Jan 16 21:09:01.993000 audit[2747]: USER_ERR pid=2747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:02.010103 kernel: audit: type=1109 audit(1768597741.993:509): pid=2747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:02.010223 kernel: audit: type=1131 audit(1768597742.001:510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-64.23.236.65:22-176.126.103.184:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:02.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-64.23.236.65:22-176.126.103.184:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:02.003161 systemd[1]: sshd@108-64.23.236.65:22-176.126.103.184:49714.service: Deactivated successfully. Jan 16 21:09:02.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-64.23.236.65:22-176.126.103.184:40938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:02.200431 systemd[1]: Started sshd@109-64.23.236.65:22-176.126.103.184:40938.service - OpenSSH per-connection server daemon (176.126.103.184:40938). Jan 16 21:09:02.209006 kernel: audit: type=1130 audit(1768597742.199:511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-64.23.236.65:22-176.126.103.184:40938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:02.818636 sshd[2753]: Invalid user user from 176.126.103.184 port 40938 Jan 16 21:09:03.005025 sshd[2753]: Connection closed by invalid user user 176.126.103.184 port 40938 [preauth] Jan 16 21:09:03.004000 audit[2753]: USER_ERR pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:03.009594 systemd[1]: sshd@109-64.23.236.65:22-176.126.103.184:40938.service: Deactivated successfully. Jan 16 21:09:03.010992 kernel: audit: type=1109 audit(1768597743.004:512): pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:03.011106 kernel: audit: type=1131 audit(1768597743.009:513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-64.23.236.65:22-176.126.103.184:40938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:03.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-64.23.236.65:22-176.126.103.184:40938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:03.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-64.23.236.65:22-176.126.103.184:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:03.224359 systemd[1]: Started sshd@110-64.23.236.65:22-176.126.103.184:40950.service - OpenSSH per-connection server daemon (176.126.103.184:40950). Jan 16 21:09:03.229978 kernel: audit: type=1130 audit(1768597743.223:514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-64.23.236.65:22-176.126.103.184:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:03.856620 sshd[2759]: Invalid user user from 176.126.103.184 port 40950 Jan 16 21:09:04.051686 sshd[2759]: Connection closed by invalid user user 176.126.103.184 port 40950 [preauth] Jan 16 21:09:04.050000 audit[2759]: USER_ERR pid=2759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:04.053890 systemd[1]: sshd@110-64.23.236.65:22-176.126.103.184:40950.service: Deactivated successfully. Jan 16 21:09:04.057199 kernel: audit: type=1109 audit(1768597744.050:515): pid=2759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:04.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-64.23.236.65:22-176.126.103.184:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:04.062083 kernel: audit: type=1131 audit(1768597744.053:516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-64.23.236.65:22-176.126.103.184:40950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:04.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-64.23.236.65:22-176.126.103.184:40966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:04.258555 systemd[1]: Started sshd@111-64.23.236.65:22-176.126.103.184:40966.service - OpenSSH per-connection server daemon (176.126.103.184:40966). Jan 16 21:09:04.264025 kernel: audit: type=1130 audit(1768597744.257:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-64.23.236.65:22-176.126.103.184:40966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:04.887989 sshd[2765]: Invalid user user from 176.126.103.184 port 40966 Jan 16 21:09:05.080996 sshd[2765]: Connection closed by invalid user user 176.126.103.184 port 40966 [preauth] Jan 16 21:09:05.080000 audit[2765]: USER_ERR pid=2765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:05.082945 systemd[1]: sshd@111-64.23.236.65:22-176.126.103.184:40966.service: Deactivated successfully. Jan 16 21:09:05.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-64.23.236.65:22-176.126.103.184:40966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:05.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-64.23.236.65:22-176.126.103.184:40976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:05.283241 systemd[1]: Started sshd@112-64.23.236.65:22-176.126.103.184:40976.service - OpenSSH per-connection server daemon (176.126.103.184:40976). Jan 16 21:09:05.903747 sshd[2771]: Invalid user user from 176.126.103.184 port 40976 Jan 16 21:09:06.096076 sshd[2771]: Connection closed by invalid user user 176.126.103.184 port 40976 [preauth] Jan 16 21:09:06.095000 audit[2771]: USER_ERR pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:06.098203 systemd[1]: sshd@112-64.23.236.65:22-176.126.103.184:40976.service: Deactivated successfully. Jan 16 21:09:06.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-64.23.236.65:22-176.126.103.184:40976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:06.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-64.23.236.65:22-176.126.103.184:40980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:06.306860 systemd[1]: Started sshd@113-64.23.236.65:22-176.126.103.184:40980.service - OpenSSH per-connection server daemon (176.126.103.184:40980). Jan 16 21:09:06.308492 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:06.308540 kernel: audit: type=1130 audit(1768597746.306:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-64.23.236.65:22-176.126.103.184:40980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:06.924696 sshd[2777]: Invalid user user from 176.126.103.184 port 40980 Jan 16 21:09:07.116577 sshd[2777]: Connection closed by invalid user user 176.126.103.184 port 40980 [preauth] Jan 16 21:09:07.116000 audit[2777]: USER_ERR pid=2777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:07.119989 systemd[1]: sshd@113-64.23.236.65:22-176.126.103.184:40980.service: Deactivated successfully. Jan 16 21:09:07.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-64.23.236.65:22-176.126.103.184:40980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:07.123150 kernel: audit: type=1109 audit(1768597747.116:524): pid=2777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:07.123269 kernel: audit: type=1131 audit(1768597747.118:525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-64.23.236.65:22-176.126.103.184:40980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:07.325172 systemd[1]: Started sshd@114-64.23.236.65:22-176.126.103.184:40988.service - OpenSSH per-connection server daemon (176.126.103.184:40988). Jan 16 21:09:07.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-64.23.236.65:22-176.126.103.184:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:07.330144 kernel: audit: type=1130 audit(1768597747.324:526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-64.23.236.65:22-176.126.103.184:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:07.963080 sshd[2783]: Invalid user user from 176.126.103.184 port 40988 Jan 16 21:09:08.156030 sshd[2783]: Connection closed by invalid user user 176.126.103.184 port 40988 [preauth] Jan 16 21:09:08.155000 audit[2783]: USER_ERR pid=2783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:08.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-64.23.236.65:22-176.126.103.184:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:08.161416 systemd[1]: sshd@114-64.23.236.65:22-176.126.103.184:40988.service: Deactivated successfully. Jan 16 21:09:08.163719 kernel: audit: type=1109 audit(1768597748.155:527): pid=2783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:08.163773 kernel: audit: type=1131 audit(1768597748.160:528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-64.23.236.65:22-176.126.103.184:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:08.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-64.23.236.65:22-176.126.103.184:41000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:08.367000 systemd[1]: Started sshd@115-64.23.236.65:22-176.126.103.184:41000.service - OpenSSH per-connection server daemon (176.126.103.184:41000). Jan 16 21:09:08.372075 kernel: audit: type=1130 audit(1768597748.366:529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-64.23.236.65:22-176.126.103.184:41000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:08.991759 sshd[2789]: Invalid user user from 176.126.103.184 port 41000 Jan 16 21:09:09.184532 sshd[2789]: Connection closed by invalid user user 176.126.103.184 port 41000 [preauth] Jan 16 21:09:09.183000 audit[2789]: USER_ERR pid=2789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:09.188575 systemd[1]: sshd@115-64.23.236.65:22-176.126.103.184:41000.service: Deactivated successfully. Jan 16 21:09:09.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-64.23.236.65:22-176.126.103.184:41000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:09.191137 kernel: audit: type=1109 audit(1768597749.183:530): pid=2789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:09.191218 kernel: audit: type=1131 audit(1768597749.187:531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-64.23.236.65:22-176.126.103.184:41000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:09.390056 systemd[1]: Started sshd@116-64.23.236.65:22-176.126.103.184:41002.service - OpenSSH per-connection server daemon (176.126.103.184:41002). Jan 16 21:09:09.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-64.23.236.65:22-176.126.103.184:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:09.396817 kernel: audit: type=1130 audit(1768597749.389:532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-64.23.236.65:22-176.126.103.184:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:10.013485 sshd[2796]: Invalid user user from 176.126.103.184 port 41002 Jan 16 21:09:10.205518 sshd[2796]: Connection closed by invalid user user 176.126.103.184 port 41002 [preauth] Jan 16 21:09:10.205000 audit[2796]: USER_ERR pid=2796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:10.207893 systemd[1]: sshd@116-64.23.236.65:22-176.126.103.184:41002.service: Deactivated successfully. Jan 16 21:09:10.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-64.23.236.65:22-176.126.103.184:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:10.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-64.23.236.65:22-176.126.103.184:41010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:10.392986 systemd[1]: Started sshd@117-64.23.236.65:22-176.126.103.184:41010.service - OpenSSH per-connection server daemon (176.126.103.184:41010). Jan 16 21:09:10.985928 sshd[2802]: Invalid user user from 176.126.103.184 port 41010 Jan 16 21:09:11.166082 sshd[2802]: Connection closed by invalid user user 176.126.103.184 port 41010 [preauth] Jan 16 21:09:11.165000 audit[2802]: USER_ERR pid=2802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:11.169024 systemd[1]: sshd@117-64.23.236.65:22-176.126.103.184:41010.service: Deactivated successfully. Jan 16 21:09:11.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-64.23.236.65:22-176.126.103.184:41010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:11.374063 systemd[1]: Started sshd@118-64.23.236.65:22-176.126.103.184:41026.service - OpenSSH per-connection server daemon (176.126.103.184:41026). Jan 16 21:09:11.379293 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:11.379368 kernel: audit: type=1130 audit(1768597751.373:538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-64.23.236.65:22-176.126.103.184:41026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:11.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-64.23.236.65:22-176.126.103.184:41026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:11.985413 sshd[2808]: Invalid user user from 176.126.103.184 port 41026 Jan 16 21:09:12.173995 sshd[2808]: Connection closed by invalid user user 176.126.103.184 port 41026 [preauth] Jan 16 21:09:12.173000 audit[2808]: USER_ERR pid=2808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:12.177367 systemd[1]: sshd@118-64.23.236.65:22-176.126.103.184:41026.service: Deactivated successfully. Jan 16 21:09:12.178997 kernel: audit: type=1109 audit(1768597752.173:539): pid=2808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:12.179092 kernel: audit: type=1131 audit(1768597752.175:540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-64.23.236.65:22-176.126.103.184:41026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:12.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-64.23.236.65:22-176.126.103.184:41026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:12.389630 systemd[1]: Started sshd@119-64.23.236.65:22-176.126.103.184:60930.service - OpenSSH per-connection server daemon (176.126.103.184:60930). Jan 16 21:09:12.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-64.23.236.65:22-176.126.103.184:60930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:12.395016 kernel: audit: type=1130 audit(1768597752.389:541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-64.23.236.65:22-176.126.103.184:60930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:13.014826 sshd[2814]: Invalid user user from 176.126.103.184 port 60930 Jan 16 21:09:13.208000 audit[2814]: USER_ERR pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:13.210228 sshd[2814]: Connection closed by invalid user user 176.126.103.184 port 60930 [preauth] Jan 16 21:09:13.212515 systemd[1]: sshd@119-64.23.236.65:22-176.126.103.184:60930.service: Deactivated successfully. Jan 16 21:09:13.215119 kernel: audit: type=1109 audit(1768597753.208:542): pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:13.215249 kernel: audit: type=1131 audit(1768597753.211:543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-64.23.236.65:22-176.126.103.184:60930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:13.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-64.23.236.65:22-176.126.103.184:60930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:13.414022 systemd[1]: Started sshd@120-64.23.236.65:22-176.126.103.184:60932.service - OpenSSH per-connection server daemon (176.126.103.184:60932). Jan 16 21:09:13.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-64.23.236.65:22-176.126.103.184:60932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:13.420067 kernel: audit: type=1130 audit(1768597753.413:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-64.23.236.65:22-176.126.103.184:60932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:14.041294 sshd[2820]: Invalid user user from 176.126.103.184 port 60932 Jan 16 21:09:14.233728 sshd[2820]: Connection closed by invalid user user 176.126.103.184 port 60932 [preauth] Jan 16 21:09:14.233000 audit[2820]: USER_ERR pid=2820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:14.237443 systemd[1]: sshd@120-64.23.236.65:22-176.126.103.184:60932.service: Deactivated successfully. Jan 16 21:09:14.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-64.23.236.65:22-176.126.103.184:60932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:14.241433 kernel: audit: type=1109 audit(1768597754.233:545): pid=2820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:14.241532 kernel: audit: type=1131 audit(1768597754.236:546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-64.23.236.65:22-176.126.103.184:60932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:14.439509 systemd[1]: Started sshd@121-64.23.236.65:22-176.126.103.184:60936.service - OpenSSH per-connection server daemon (176.126.103.184:60936). Jan 16 21:09:14.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-64.23.236.65:22-176.126.103.184:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:14.445189 kernel: audit: type=1130 audit(1768597754.439:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-64.23.236.65:22-176.126.103.184:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:15.063208 sshd[2827]: Invalid user user from 176.126.103.184 port 60936 Jan 16 21:09:15.255824 sshd[2827]: Connection closed by invalid user user 176.126.103.184 port 60936 [preauth] Jan 16 21:09:15.254000 audit[2827]: USER_ERR pid=2827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:15.258465 systemd[1]: sshd@121-64.23.236.65:22-176.126.103.184:60936.service: Deactivated successfully. Jan 16 21:09:15.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-64.23.236.65:22-176.126.103.184:60936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:15.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-64.23.236.65:22-176.126.103.184:60942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:15.462704 systemd[1]: Started sshd@122-64.23.236.65:22-176.126.103.184:60942.service - OpenSSH per-connection server daemon (176.126.103.184:60942). Jan 16 21:09:16.097718 sshd[2833]: Invalid user user from 176.126.103.184 port 60942 Jan 16 21:09:16.291000 sshd[2833]: Connection closed by invalid user user 176.126.103.184 port 60942 [preauth] Jan 16 21:09:16.290000 audit[2833]: USER_ERR pid=2833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:16.294263 systemd[1]: sshd@122-64.23.236.65:22-176.126.103.184:60942.service: Deactivated successfully. Jan 16 21:09:16.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-64.23.236.65:22-176.126.103.184:60942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:16.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-64.23.236.65:22-176.126.103.184:60952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:16.496138 systemd[1]: Started sshd@123-64.23.236.65:22-176.126.103.184:60952.service - OpenSSH per-connection server daemon (176.126.103.184:60952). Jan 16 21:09:16.498192 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:16.498272 kernel: audit: type=1130 audit(1768597756.495:553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-64.23.236.65:22-176.126.103.184:60952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:17.122013 sshd[2839]: Invalid user user from 176.126.103.184 port 60952 Jan 16 21:09:17.314804 sshd[2839]: Connection closed by invalid user user 176.126.103.184 port 60952 [preauth] Jan 16 21:09:17.314000 audit[2839]: USER_ERR pid=2839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:17.319588 systemd[1]: sshd@123-64.23.236.65:22-176.126.103.184:60952.service: Deactivated successfully. Jan 16 21:09:17.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-64.23.236.65:22-176.126.103.184:60952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:17.324437 kernel: audit: type=1109 audit(1768597757.314:554): pid=2839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:17.324505 kernel: audit: type=1131 audit(1768597757.318:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-64.23.236.65:22-176.126.103.184:60952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:17.528401 systemd[1]: Started sshd@124-64.23.236.65:22-176.126.103.184:60966.service - OpenSSH per-connection server daemon (176.126.103.184:60966). Jan 16 21:09:17.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-64.23.236.65:22-176.126.103.184:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:17.534983 kernel: audit: type=1130 audit(1768597757.527:556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-64.23.236.65:22-176.126.103.184:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:18.149565 sshd[2845]: Invalid user user from 176.126.103.184 port 60966 Jan 16 21:09:18.342781 sshd[2845]: Connection closed by invalid user user 176.126.103.184 port 60966 [preauth] Jan 16 21:09:18.342000 audit[2845]: USER_ERR pid=2845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:18.347632 systemd[1]: sshd@124-64.23.236.65:22-176.126.103.184:60966.service: Deactivated successfully. Jan 16 21:09:18.349385 kernel: audit: type=1109 audit(1768597758.342:557): pid=2845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:18.349441 kernel: audit: type=1131 audit(1768597758.345:558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-64.23.236.65:22-176.126.103.184:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:18.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-64.23.236.65:22-176.126.103.184:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:18.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-64.23.236.65:22-176.126.103.184:60972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:18.541276 systemd[1]: Started sshd@125-64.23.236.65:22-176.126.103.184:60972.service - OpenSSH per-connection server daemon (176.126.103.184:60972). Jan 16 21:09:18.546051 kernel: audit: type=1130 audit(1768597758.540:559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-64.23.236.65:22-176.126.103.184:60972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:19.167300 sshd[2851]: Invalid user user from 176.126.103.184 port 60972 Jan 16 21:09:19.357020 sshd[2851]: Connection closed by invalid user user 176.126.103.184 port 60972 [preauth] Jan 16 21:09:19.356000 audit[2851]: USER_ERR pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:19.361461 systemd[1]: sshd@125-64.23.236.65:22-176.126.103.184:60972.service: Deactivated successfully. Jan 16 21:09:19.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-64.23.236.65:22-176.126.103.184:60972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:19.366060 kernel: audit: type=1109 audit(1768597759.356:560): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:19.366131 kernel: audit: type=1131 audit(1768597759.359:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-64.23.236.65:22-176.126.103.184:60972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:19.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-64.23.236.65:22-176.126.103.184:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:19.559137 systemd[1]: Started sshd@126-64.23.236.65:22-176.126.103.184:60982.service - OpenSSH per-connection server daemon (176.126.103.184:60982). Jan 16 21:09:19.566009 kernel: audit: type=1130 audit(1768597759.558:562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-64.23.236.65:22-176.126.103.184:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:20.176771 sshd[2857]: Invalid user user from 176.126.103.184 port 60982 Jan 16 21:09:20.365711 sshd[2857]: Connection closed by invalid user user 176.126.103.184 port 60982 [preauth] Jan 16 21:09:20.365000 audit[2857]: USER_ERR pid=2857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:20.369333 systemd[1]: sshd@126-64.23.236.65:22-176.126.103.184:60982.service: Deactivated successfully. Jan 16 21:09:20.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-64.23.236.65:22-176.126.103.184:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:20.572565 systemd[1]: Started sshd@127-64.23.236.65:22-176.126.103.184:60992.service - OpenSSH per-connection server daemon (176.126.103.184:60992). Jan 16 21:09:20.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-64.23.236.65:22-176.126.103.184:60992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:21.205053 sshd[2863]: Invalid user user from 176.126.103.184 port 60992 Jan 16 21:09:21.397863 sshd[2863]: Connection closed by invalid user user 176.126.103.184 port 60992 [preauth] Jan 16 21:09:21.397000 audit[2863]: USER_ERR pid=2863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:21.400306 systemd[1]: sshd@127-64.23.236.65:22-176.126.103.184:60992.service: Deactivated successfully. Jan 16 21:09:21.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-64.23.236.65:22-176.126.103.184:60992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:21.603278 systemd[1]: Started sshd@128-64.23.236.65:22-176.126.103.184:32774.service - OpenSSH per-connection server daemon (176.126.103.184:32774). Jan 16 21:09:21.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-64.23.236.65:22-176.126.103.184:32774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:21.606976 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:21.607066 kernel: audit: type=1130 audit(1768597761.602:568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-64.23.236.65:22-176.126.103.184:32774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:22.233839 sshd[2869]: Invalid user user from 176.126.103.184 port 32774 Jan 16 21:09:22.427254 sshd[2869]: Connection closed by invalid user user 176.126.103.184 port 32774 [preauth] Jan 16 21:09:22.426000 audit[2869]: USER_ERR pid=2869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:22.431572 systemd[1]: sshd@128-64.23.236.65:22-176.126.103.184:32774.service: Deactivated successfully. Jan 16 21:09:22.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-64.23.236.65:22-176.126.103.184:32774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:22.436123 kernel: audit: type=1109 audit(1768597762.426:569): pid=2869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:22.436215 kernel: audit: type=1131 audit(1768597762.429:570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-64.23.236.65:22-176.126.103.184:32774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:22.638249 systemd[1]: Started sshd@129-64.23.236.65:22-176.126.103.184:33848.service - OpenSSH per-connection server daemon (176.126.103.184:33848). Jan 16 21:09:22.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-64.23.236.65:22-176.126.103.184:33848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:22.645589 kernel: audit: type=1130 audit(1768597762.637:571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-64.23.236.65:22-176.126.103.184:33848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:23.250406 sshd[2875]: Invalid user user from 176.126.103.184 port 33848 Jan 16 21:09:23.440005 sshd[2875]: Connection closed by invalid user user 176.126.103.184 port 33848 [preauth] Jan 16 21:09:23.439000 audit[2875]: USER_ERR pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:23.445121 kernel: audit: type=1109 audit(1768597763.439:572): pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:23.442779 systemd[1]: sshd@129-64.23.236.65:22-176.126.103.184:33848.service: Deactivated successfully. Jan 16 21:09:23.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-64.23.236.65:22-176.126.103.184:33848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:23.450051 kernel: audit: type=1131 audit(1768597763.442:573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-64.23.236.65:22-176.126.103.184:33848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:23.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-64.23.236.65:22-176.126.103.184:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:23.649318 systemd[1]: Started sshd@130-64.23.236.65:22-176.126.103.184:33856.service - OpenSSH per-connection server daemon (176.126.103.184:33856). Jan 16 21:09:23.653999 kernel: audit: type=1130 audit(1768597763.648:574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-64.23.236.65:22-176.126.103.184:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:24.269488 sshd[2881]: Invalid user user from 176.126.103.184 port 33856 Jan 16 21:09:24.458076 sshd[2881]: Connection closed by invalid user user 176.126.103.184 port 33856 [preauth] Jan 16 21:09:24.457000 audit[2881]: USER_ERR pid=2881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:24.461501 systemd[1]: sshd@130-64.23.236.65:22-176.126.103.184:33856.service: Deactivated successfully. Jan 16 21:09:24.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-64.23.236.65:22-176.126.103.184:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:24.465418 kernel: audit: type=1109 audit(1768597764.457:575): pid=2881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:24.465505 kernel: audit: type=1131 audit(1768597764.459:576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-64.23.236.65:22-176.126.103.184:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:24.656605 systemd[1]: Started sshd@131-64.23.236.65:22-176.126.103.184:33858.service - OpenSSH per-connection server daemon (176.126.103.184:33858). Jan 16 21:09:24.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-64.23.236.65:22-176.126.103.184:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:24.662029 kernel: audit: type=1130 audit(1768597764.656:577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-64.23.236.65:22-176.126.103.184:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:25.267045 sshd[2887]: Invalid user user from 176.126.103.184 port 33858 Jan 16 21:09:25.454538 sshd[2887]: Connection closed by invalid user user 176.126.103.184 port 33858 [preauth] Jan 16 21:09:25.454000 audit[2887]: USER_ERR pid=2887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:25.457769 systemd[1]: sshd@131-64.23.236.65:22-176.126.103.184:33858.service: Deactivated successfully. Jan 16 21:09:25.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-64.23.236.65:22-176.126.103.184:33858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:25.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-64.23.236.65:22-176.126.103.184:33870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:25.663332 systemd[1]: Started sshd@132-64.23.236.65:22-176.126.103.184:33870.service - OpenSSH per-connection server daemon (176.126.103.184:33870). Jan 16 21:09:26.298797 sshd[2893]: Invalid user user from 176.126.103.184 port 33870 Jan 16 21:09:26.490557 sshd[2893]: Connection closed by invalid user user 176.126.103.184 port 33870 [preauth] Jan 16 21:09:26.490000 audit[2893]: USER_ERR pid=2893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:26.493783 systemd[1]: sshd@132-64.23.236.65:22-176.126.103.184:33870.service: Deactivated successfully. Jan 16 21:09:26.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-64.23.236.65:22-176.126.103.184:33870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:26.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-64.23.236.65:22-176.126.103.184:33882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:26.695245 systemd[1]: Started sshd@133-64.23.236.65:22-176.126.103.184:33882.service - OpenSSH per-connection server daemon (176.126.103.184:33882). Jan 16 21:09:26.697537 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:26.697587 kernel: audit: type=1130 audit(1768597766.694:583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-64.23.236.65:22-176.126.103.184:33882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:27.317710 sshd[2899]: Invalid user user from 176.126.103.184 port 33882 Jan 16 21:09:27.510164 sshd[2899]: Connection closed by invalid user user 176.126.103.184 port 33882 [preauth] Jan 16 21:09:27.509000 audit[2899]: USER_ERR pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:27.514978 kernel: audit: type=1109 audit(1768597767.509:584): pid=2899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:27.513392 systemd[1]: sshd@133-64.23.236.65:22-176.126.103.184:33882.service: Deactivated successfully. Jan 16 21:09:27.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-64.23.236.65:22-176.126.103.184:33882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:27.520005 kernel: audit: type=1131 audit(1768597767.511:585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-64.23.236.65:22-176.126.103.184:33882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:27.726881 systemd[1]: Started sshd@134-64.23.236.65:22-176.126.103.184:33884.service - OpenSSH per-connection server daemon (176.126.103.184:33884). Jan 16 21:09:27.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-64.23.236.65:22-176.126.103.184:33884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:27.734037 kernel: audit: type=1130 audit(1768597767.726:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-64.23.236.65:22-176.126.103.184:33884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:28.348277 sshd[2905]: Invalid user user from 176.126.103.184 port 33884 Jan 16 21:09:28.540754 sshd[2905]: Connection closed by invalid user user 176.126.103.184 port 33884 [preauth] Jan 16 21:09:28.545013 kernel: audit: type=1109 audit(1768597768.539:587): pid=2905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:28.545124 kernel: audit: type=1131 audit(1768597768.541:588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-64.23.236.65:22-176.126.103.184:33884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:28.539000 audit[2905]: USER_ERR pid=2905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:28.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-64.23.236.65:22-176.126.103.184:33884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:28.543432 systemd[1]: sshd@134-64.23.236.65:22-176.126.103.184:33884.service: Deactivated successfully. Jan 16 21:09:28.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-64.23.236.65:22-176.126.103.184:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:28.755319 systemd[1]: Started sshd@135-64.23.236.65:22-176.126.103.184:33892.service - OpenSSH per-connection server daemon (176.126.103.184:33892). Jan 16 21:09:28.761214 kernel: audit: type=1130 audit(1768597768.754:589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-64.23.236.65:22-176.126.103.184:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:29.371774 sshd[2911]: Invalid user user from 176.126.103.184 port 33892 Jan 16 21:09:29.564196 sshd[2911]: Connection closed by invalid user user 176.126.103.184 port 33892 [preauth] Jan 16 21:09:29.563000 audit[2911]: USER_ERR pid=2911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:29.569733 systemd[1]: sshd@135-64.23.236.65:22-176.126.103.184:33892.service: Deactivated successfully. Jan 16 21:09:29.569993 kernel: audit: type=1109 audit(1768597769.563:590): pid=2911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:29.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-64.23.236.65:22-176.126.103.184:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:29.575074 kernel: audit: type=1131 audit(1768597769.569:591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-64.23.236.65:22-176.126.103.184:33892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:29.776050 systemd[1]: Started sshd@136-64.23.236.65:22-176.126.103.184:33898.service - OpenSSH per-connection server daemon (176.126.103.184:33898). Jan 16 21:09:29.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-64.23.236.65:22-176.126.103.184:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:29.781236 kernel: audit: type=1130 audit(1768597769.775:592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-64.23.236.65:22-176.126.103.184:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:30.405842 sshd[2917]: Invalid user user from 176.126.103.184 port 33898 Jan 16 21:09:30.597785 sshd[2917]: Connection closed by invalid user user 176.126.103.184 port 33898 [preauth] Jan 16 21:09:30.597000 audit[2917]: USER_ERR pid=2917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:30.601158 systemd[1]: sshd@136-64.23.236.65:22-176.126.103.184:33898.service: Deactivated successfully. Jan 16 21:09:30.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-64.23.236.65:22-176.126.103.184:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:30.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-64.23.236.65:22-176.126.103.184:33904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:30.806812 systemd[1]: Started sshd@137-64.23.236.65:22-176.126.103.184:33904.service - OpenSSH per-connection server daemon (176.126.103.184:33904). Jan 16 21:09:31.434266 sshd[2923]: Invalid user user from 176.126.103.184 port 33904 Jan 16 21:09:31.625982 sshd[2923]: Connection closed by invalid user user 176.126.103.184 port 33904 [preauth] Jan 16 21:09:31.625000 audit[2923]: USER_ERR pid=2923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:31.628592 systemd[1]: sshd@137-64.23.236.65:22-176.126.103.184:33904.service: Deactivated successfully. Jan 16 21:09:31.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-64.23.236.65:22-176.126.103.184:33904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:31.830436 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:31.830574 kernel: audit: type=1130 audit(1768597771.824:598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-64.23.236.65:22-176.126.103.184:33906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:31.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-64.23.236.65:22-176.126.103.184:33906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:31.825415 systemd[1]: Started sshd@138-64.23.236.65:22-176.126.103.184:33906.service - OpenSSH per-connection server daemon (176.126.103.184:33906). Jan 16 21:09:32.416469 sshd[2929]: Invalid user user from 176.126.103.184 port 33906 Jan 16 21:09:32.601006 sshd[2929]: Connection closed by invalid user user 176.126.103.184 port 33906 [preauth] Jan 16 21:09:32.600000 audit[2929]: USER_ERR pid=2929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:32.605577 systemd[1]: sshd@138-64.23.236.65:22-176.126.103.184:33906.service: Deactivated successfully. Jan 16 21:09:32.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-64.23.236.65:22-176.126.103.184:33906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:32.609186 kernel: audit: type=1109 audit(1768597772.600:599): pid=2929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:32.609319 kernel: audit: type=1131 audit(1768597772.603:600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-64.23.236.65:22-176.126.103.184:33906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:32.809270 systemd[1]: Started sshd@139-64.23.236.65:22-176.126.103.184:40896.service - OpenSSH per-connection server daemon (176.126.103.184:40896). Jan 16 21:09:32.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-64.23.236.65:22-176.126.103.184:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:32.815009 kernel: audit: type=1130 audit(1768597772.808:601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-64.23.236.65:22-176.126.103.184:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:33.455782 sshd[2935]: Invalid user user from 176.126.103.184 port 40896 Jan 16 21:09:33.648922 sshd[2935]: Connection closed by invalid user user 176.126.103.184 port 40896 [preauth] Jan 16 21:09:33.648000 audit[2935]: USER_ERR pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:33.651075 systemd[1]: sshd@139-64.23.236.65:22-176.126.103.184:40896.service: Deactivated successfully. Jan 16 21:09:33.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-64.23.236.65:22-176.126.103.184:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:33.656340 kernel: audit: type=1109 audit(1768597773.648:602): pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:33.656420 kernel: audit: type=1131 audit(1768597773.649:603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-64.23.236.65:22-176.126.103.184:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:33.854141 systemd[1]: Started sshd@140-64.23.236.65:22-176.126.103.184:40902.service - OpenSSH per-connection server daemon (176.126.103.184:40902). Jan 16 21:09:33.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-64.23.236.65:22-176.126.103.184:40902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:33.859987 kernel: audit: type=1130 audit(1768597773.853:604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-64.23.236.65:22-176.126.103.184:40902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:34.471975 sshd[2941]: Invalid user user from 176.126.103.184 port 40902 Jan 16 21:09:34.663495 sshd[2941]: Connection closed by invalid user user 176.126.103.184 port 40902 [preauth] Jan 16 21:09:34.663000 audit[2941]: USER_ERR pid=2941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:34.668052 kernel: audit: type=1109 audit(1768597774.663:605): pid=2941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:34.666407 systemd[1]: sshd@140-64.23.236.65:22-176.126.103.184:40902.service: Deactivated successfully. Jan 16 21:09:34.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-64.23.236.65:22-176.126.103.184:40902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:34.671978 kernel: audit: type=1131 audit(1768597774.665:606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-64.23.236.65:22-176.126.103.184:40902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:34.864527 systemd[1]: Started sshd@141-64.23.236.65:22-176.126.103.184:40908.service - OpenSSH per-connection server daemon (176.126.103.184:40908). Jan 16 21:09:34.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-64.23.236.65:22-176.126.103.184:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:34.869219 kernel: audit: type=1130 audit(1768597774.863:607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-64.23.236.65:22-176.126.103.184:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:35.471523 sshd[2947]: Invalid user user from 176.126.103.184 port 40908 Jan 16 21:09:35.659814 sshd[2947]: Connection closed by invalid user user 176.126.103.184 port 40908 [preauth] Jan 16 21:09:35.659000 audit[2947]: USER_ERR pid=2947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:35.662063 systemd[1]: sshd@141-64.23.236.65:22-176.126.103.184:40908.service: Deactivated successfully. Jan 16 21:09:35.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-64.23.236.65:22-176.126.103.184:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:35.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-64.23.236.65:22-176.126.103.184:40918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:35.867786 systemd[1]: Started sshd@142-64.23.236.65:22-176.126.103.184:40918.service - OpenSSH per-connection server daemon (176.126.103.184:40918). Jan 16 21:09:36.478985 sshd[2953]: Invalid user user from 176.126.103.184 port 40918 Jan 16 21:09:36.666984 sshd[2953]: Connection closed by invalid user user 176.126.103.184 port 40918 [preauth] Jan 16 21:09:36.666000 audit[2953]: USER_ERR pid=2953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:36.669886 systemd[1]: sshd@142-64.23.236.65:22-176.126.103.184:40918.service: Deactivated successfully. Jan 16 21:09:36.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-64.23.236.65:22-176.126.103.184:40918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:36.870306 systemd[1]: Started sshd@143-64.23.236.65:22-176.126.103.184:40932.service - OpenSSH per-connection server daemon (176.126.103.184:40932). Jan 16 21:09:36.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-64.23.236.65:22-176.126.103.184:40932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:36.872232 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:36.872316 kernel: audit: type=1130 audit(1768597776.870:613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-64.23.236.65:22-176.126.103.184:40932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:37.497995 sshd[2959]: Invalid user user from 176.126.103.184 port 40932 Jan 16 21:09:37.688843 sshd[2959]: Connection closed by invalid user user 176.126.103.184 port 40932 [preauth] Jan 16 21:09:37.688000 audit[2959]: USER_ERR pid=2959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:37.691537 systemd[1]: sshd@143-64.23.236.65:22-176.126.103.184:40932.service: Deactivated successfully. Jan 16 21:09:37.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-64.23.236.65:22-176.126.103.184:40932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:37.695671 kernel: audit: type=1109 audit(1768597777.688:614): pid=2959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:37.695737 kernel: audit: type=1131 audit(1768597777.690:615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-64.23.236.65:22-176.126.103.184:40932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:37.906608 systemd[1]: Started sshd@144-64.23.236.65:22-176.126.103.184:40936.service - OpenSSH per-connection server daemon (176.126.103.184:40936). Jan 16 21:09:37.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-64.23.236.65:22-176.126.103.184:40936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:37.910978 kernel: audit: type=1130 audit(1768597777.905:616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-64.23.236.65:22-176.126.103.184:40936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:38.523340 sshd[2965]: Invalid user user from 176.126.103.184 port 40936 Jan 16 21:09:38.716000 audit[2965]: USER_ERR pid=2965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:38.719153 sshd[2965]: Connection closed by invalid user user 176.126.103.184 port 40936 [preauth] Jan 16 21:09:38.722429 systemd[1]: sshd@144-64.23.236.65:22-176.126.103.184:40936.service: Deactivated successfully. Jan 16 21:09:38.727279 kernel: audit: type=1109 audit(1768597778.716:617): pid=2965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:38.727355 kernel: audit: type=1131 audit(1768597778.721:618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-64.23.236.65:22-176.126.103.184:40936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:38.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-64.23.236.65:22-176.126.103.184:40936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:38.926404 systemd[1]: Started sshd@145-64.23.236.65:22-176.126.103.184:40946.service - OpenSSH per-connection server daemon (176.126.103.184:40946). Jan 16 21:09:38.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-64.23.236.65:22-176.126.103.184:40946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:38.932111 kernel: audit: type=1130 audit(1768597778.926:619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-64.23.236.65:22-176.126.103.184:40946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:39.555718 sshd[2971]: Invalid user user from 176.126.103.184 port 40946 Jan 16 21:09:39.749514 sshd[2971]: Connection closed by invalid user user 176.126.103.184 port 40946 [preauth] Jan 16 21:09:39.748000 audit[2971]: USER_ERR pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:39.753987 kernel: audit: type=1109 audit(1768597779.748:620): pid=2971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:39.754275 systemd[1]: sshd@145-64.23.236.65:22-176.126.103.184:40946.service: Deactivated successfully. Jan 16 21:09:39.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-64.23.236.65:22-176.126.103.184:40946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:39.759999 kernel: audit: type=1131 audit(1768597779.753:621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-64.23.236.65:22-176.126.103.184:40946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:39.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-64.23.236.65:22-176.126.103.184:40952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:39.954316 systemd[1]: Started sshd@146-64.23.236.65:22-176.126.103.184:40952.service - OpenSSH per-connection server daemon (176.126.103.184:40952). Jan 16 21:09:39.960674 kernel: audit: type=1130 audit(1768597779.953:622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-64.23.236.65:22-176.126.103.184:40952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:40.588880 sshd[2977]: Invalid user user from 176.126.103.184 port 40952 Jan 16 21:09:40.782818 sshd[2977]: Connection closed by invalid user user 176.126.103.184 port 40952 [preauth] Jan 16 21:09:40.782000 audit[2977]: USER_ERR pid=2977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:40.785347 systemd[1]: sshd@146-64.23.236.65:22-176.126.103.184:40952.service: Deactivated successfully. Jan 16 21:09:40.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-64.23.236.65:22-176.126.103.184:40952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:40.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-64.23.236.65:22-176.126.103.184:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:40.990243 systemd[1]: Started sshd@147-64.23.236.65:22-176.126.103.184:40962.service - OpenSSH per-connection server daemon (176.126.103.184:40962). Jan 16 21:09:41.602164 sshd[2983]: Invalid user user from 176.126.103.184 port 40962 Jan 16 21:09:41.791493 sshd[2983]: Connection closed by invalid user user 176.126.103.184 port 40962 [preauth] Jan 16 21:09:41.791000 audit[2983]: USER_ERR pid=2983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:41.793792 systemd[1]: sshd@147-64.23.236.65:22-176.126.103.184:40962.service: Deactivated successfully. Jan 16 21:09:41.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-64.23.236.65:22-176.126.103.184:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:42.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-64.23.236.65:22-176.126.103.184:40968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:42.000974 systemd[1]: Started sshd@148-64.23.236.65:22-176.126.103.184:40968.service - OpenSSH per-connection server daemon (176.126.103.184:40968). Jan 16 21:09:42.003900 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:42.004000 kernel: audit: type=1130 audit(1768597782.000:628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-64.23.236.65:22-176.126.103.184:40968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:42.631587 sshd[2989]: Invalid user user from 176.126.103.184 port 40968 Jan 16 21:09:42.824709 sshd[2989]: Connection closed by invalid user user 176.126.103.184 port 40968 [preauth] Jan 16 21:09:42.824000 audit[2989]: USER_ERR pid=2989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:42.830844 systemd[1]: sshd@148-64.23.236.65:22-176.126.103.184:40968.service: Deactivated successfully. Jan 16 21:09:42.831135 kernel: audit: type=1109 audit(1768597782.824:629): pid=2989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:42.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-64.23.236.65:22-176.126.103.184:40968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:42.838249 kernel: audit: type=1131 audit(1768597782.830:630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-64.23.236.65:22-176.126.103.184:40968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:43.031647 systemd[1]: Started sshd@149-64.23.236.65:22-176.126.103.184:56980.service - OpenSSH per-connection server daemon (176.126.103.184:56980). Jan 16 21:09:43.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-64.23.236.65:22-176.126.103.184:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:43.037117 kernel: audit: type=1130 audit(1768597783.031:631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-64.23.236.65:22-176.126.103.184:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:43.651266 sshd[2995]: Invalid user user from 176.126.103.184 port 56980 Jan 16 21:09:43.842696 sshd[2995]: Connection closed by invalid user user 176.126.103.184 port 56980 [preauth] Jan 16 21:09:43.841000 audit[2995]: USER_ERR pid=2995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:43.845364 systemd[1]: sshd@149-64.23.236.65:22-176.126.103.184:56980.service: Deactivated successfully. Jan 16 21:09:43.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-64.23.236.65:22-176.126.103.184:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:43.852196 kernel: audit: type=1109 audit(1768597783.841:632): pid=2995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:43.852295 kernel: audit: type=1131 audit(1768597783.843:633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-64.23.236.65:22-176.126.103.184:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:44.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-64.23.236.65:22-176.126.103.184:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:44.051408 systemd[1]: Started sshd@150-64.23.236.65:22-176.126.103.184:56984.service - OpenSSH per-connection server daemon (176.126.103.184:56984). Jan 16 21:09:44.056996 kernel: audit: type=1130 audit(1768597784.050:634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-64.23.236.65:22-176.126.103.184:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:44.674939 sshd[3001]: Invalid user user from 176.126.103.184 port 56984 Jan 16 21:09:44.865990 sshd[3001]: Connection closed by invalid user user 176.126.103.184 port 56984 [preauth] Jan 16 21:09:44.865000 audit[3001]: USER_ERR pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:44.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-64.23.236.65:22-176.126.103.184:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:44.869436 systemd[1]: sshd@150-64.23.236.65:22-176.126.103.184:56984.service: Deactivated successfully. Jan 16 21:09:44.872748 kernel: audit: type=1109 audit(1768597784.865:635): pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:44.872840 kernel: audit: type=1131 audit(1768597784.867:636): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-64.23.236.65:22-176.126.103.184:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:45.065660 systemd[1]: Started sshd@151-64.23.236.65:22-176.126.103.184:56994.service - OpenSSH per-connection server daemon (176.126.103.184:56994). Jan 16 21:09:45.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-64.23.236.65:22-176.126.103.184:56994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:45.071991 kernel: audit: type=1130 audit(1768597785.065:637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-64.23.236.65:22-176.126.103.184:56994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:45.671125 sshd[3007]: Invalid user user from 176.126.103.184 port 56994 Jan 16 21:09:45.858766 sshd[3007]: Connection closed by invalid user user 176.126.103.184 port 56994 [preauth] Jan 16 21:09:45.858000 audit[3007]: USER_ERR pid=3007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:45.861496 systemd[1]: sshd@151-64.23.236.65:22-176.126.103.184:56994.service: Deactivated successfully. Jan 16 21:09:45.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-64.23.236.65:22-176.126.103.184:56994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:46.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-64.23.236.65:22-176.126.103.184:57004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:46.064270 systemd[1]: Started sshd@152-64.23.236.65:22-176.126.103.184:57004.service - OpenSSH per-connection server daemon (176.126.103.184:57004). Jan 16 21:09:46.684456 sshd[3013]: Invalid user user from 176.126.103.184 port 57004 Jan 16 21:09:46.872756 sshd[3013]: Connection closed by invalid user user 176.126.103.184 port 57004 [preauth] Jan 16 21:09:46.872000 audit[3013]: USER_ERR pid=3013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:46.875620 systemd[1]: sshd@152-64.23.236.65:22-176.126.103.184:57004.service: Deactivated successfully. Jan 16 21:09:46.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-64.23.236.65:22-176.126.103.184:57004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:47.083133 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:47.083261 kernel: audit: type=1130 audit(1768597787.075:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-64.23.236.65:22-176.126.103.184:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:47.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-64.23.236.65:22-176.126.103.184:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:47.075889 systemd[1]: Started sshd@153-64.23.236.65:22-176.126.103.184:57010.service - OpenSSH per-connection server daemon (176.126.103.184:57010). Jan 16 21:09:47.695195 sshd[3019]: Invalid user user from 176.126.103.184 port 57010 Jan 16 21:09:47.884266 sshd[3019]: Connection closed by invalid user user 176.126.103.184 port 57010 [preauth] Jan 16 21:09:47.884000 audit[3019]: USER_ERR pid=3019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:47.887825 systemd[1]: sshd@153-64.23.236.65:22-176.126.103.184:57010.service: Deactivated successfully. Jan 16 21:09:47.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-64.23.236.65:22-176.126.103.184:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:47.891666 kernel: audit: type=1109 audit(1768597787.884:644): pid=3019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:47.891765 kernel: audit: type=1131 audit(1768597787.887:645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-64.23.236.65:22-176.126.103.184:57010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:48.098116 systemd[1]: Started sshd@154-64.23.236.65:22-176.126.103.184:57018.service - OpenSSH per-connection server daemon (176.126.103.184:57018). Jan 16 21:09:48.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-64.23.236.65:22-176.126.103.184:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:48.105097 kernel: audit: type=1130 audit(1768597788.097:646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-64.23.236.65:22-176.126.103.184:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:48.747921 sshd[3025]: Invalid user user from 176.126.103.184 port 57018 Jan 16 21:09:48.940998 sshd[3025]: Connection closed by invalid user user 176.126.103.184 port 57018 [preauth] Jan 16 21:09:48.940000 audit[3025]: USER_ERR pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:48.946988 kernel: audit: type=1109 audit(1768597788.940:647): pid=3025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:48.948231 systemd[1]: sshd@154-64.23.236.65:22-176.126.103.184:57018.service: Deactivated successfully. Jan 16 21:09:48.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-64.23.236.65:22-176.126.103.184:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:48.953016 kernel: audit: type=1131 audit(1768597788.947:648): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-64.23.236.65:22-176.126.103.184:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:49.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-64.23.236.65:22-176.126.103.184:57022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:49.151211 systemd[1]: Started sshd@155-64.23.236.65:22-176.126.103.184:57022.service - OpenSSH per-connection server daemon (176.126.103.184:57022). Jan 16 21:09:49.155979 kernel: audit: type=1130 audit(1768597789.150:649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-64.23.236.65:22-176.126.103.184:57022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:49.771920 sshd[3031]: Invalid user user from 176.126.103.184 port 57022 Jan 16 21:09:49.966017 sshd[3031]: Connection closed by invalid user user 176.126.103.184 port 57022 [preauth] Jan 16 21:09:49.965000 audit[3031]: USER_ERR pid=3031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:49.970607 systemd[1]: sshd@155-64.23.236.65:22-176.126.103.184:57022.service: Deactivated successfully. Jan 16 21:09:49.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-64.23.236.65:22-176.126.103.184:57022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:49.973728 kernel: audit: type=1109 audit(1768597789.965:650): pid=3031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:49.973858 kernel: audit: type=1131 audit(1768597789.968:651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-64.23.236.65:22-176.126.103.184:57022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:50.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-64.23.236.65:22-176.126.103.184:57032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:50.168474 systemd[1]: Started sshd@156-64.23.236.65:22-176.126.103.184:57032.service - OpenSSH per-connection server daemon (176.126.103.184:57032). Jan 16 21:09:50.172973 kernel: audit: type=1130 audit(1768597790.167:652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-64.23.236.65:22-176.126.103.184:57032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:50.784488 sshd[3037]: Invalid user user from 176.126.103.184 port 57032 Jan 16 21:09:50.971897 sshd[3037]: Connection closed by invalid user user 176.126.103.184 port 57032 [preauth] Jan 16 21:09:50.971000 audit[3037]: USER_ERR pid=3037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:50.974826 systemd[1]: sshd@156-64.23.236.65:22-176.126.103.184:57032.service: Deactivated successfully. Jan 16 21:09:50.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-64.23.236.65:22-176.126.103.184:57032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:51.187849 systemd[1]: Started sshd@157-64.23.236.65:22-176.126.103.184:57044.service - OpenSSH per-connection server daemon (176.126.103.184:57044). Jan 16 21:09:51.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-64.23.236.65:22-176.126.103.184:57044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:51.826501 sshd[3043]: Invalid user user from 176.126.103.184 port 57044 Jan 16 21:09:52.019005 sshd[3043]: Connection closed by invalid user user 176.126.103.184 port 57044 [preauth] Jan 16 21:09:52.018000 audit[3043]: USER_ERR pid=3043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:52.022458 systemd[1]: sshd@157-64.23.236.65:22-176.126.103.184:57044.service: Deactivated successfully. Jan 16 21:09:52.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-64.23.236.65:22-176.126.103.184:57044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:52.220777 systemd[1]: Started sshd@158-64.23.236.65:22-176.126.103.184:54994.service - OpenSSH per-connection server daemon (176.126.103.184:54994). Jan 16 21:09:52.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-64.23.236.65:22-176.126.103.184:54994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:52.222260 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:52.222315 kernel: audit: type=1130 audit(1768597792.220:658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-64.23.236.65:22-176.126.103.184:54994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:52.835606 sshd[3049]: Invalid user user from 176.126.103.184 port 54994 Jan 16 21:09:53.023057 sshd[3049]: Connection closed by invalid user user 176.126.103.184 port 54994 [preauth] Jan 16 21:09:53.022000 audit[3049]: USER_ERR pid=3049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:53.026519 systemd[1]: sshd@158-64.23.236.65:22-176.126.103.184:54994.service: Deactivated successfully. Jan 16 21:09:53.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-64.23.236.65:22-176.126.103.184:54994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:53.029612 kernel: audit: type=1109 audit(1768597793.022:659): pid=3049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:53.029688 kernel: audit: type=1131 audit(1768597793.024:660): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-64.23.236.65:22-176.126.103.184:54994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:53.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-64.23.236.65:22-176.126.103.184:55006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:53.222355 systemd[1]: Started sshd@159-64.23.236.65:22-176.126.103.184:55006.service - OpenSSH per-connection server daemon (176.126.103.184:55006). Jan 16 21:09:53.227002 kernel: audit: type=1130 audit(1768597793.221:661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-64.23.236.65:22-176.126.103.184:55006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:53.825427 sshd[3055]: Invalid user user from 176.126.103.184 port 55006 Jan 16 21:09:54.010089 sshd[3055]: Connection closed by invalid user user 176.126.103.184 port 55006 [preauth] Jan 16 21:09:54.009000 audit[3055]: USER_ERR pid=3055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:54.013461 systemd[1]: sshd@159-64.23.236.65:22-176.126.103.184:55006.service: Deactivated successfully. Jan 16 21:09:54.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-64.23.236.65:22-176.126.103.184:55006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:54.017659 kernel: audit: type=1109 audit(1768597794.009:662): pid=3055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:54.017741 kernel: audit: type=1131 audit(1768597794.012:663): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-64.23.236.65:22-176.126.103.184:55006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:54.228826 systemd[1]: Started sshd@160-64.23.236.65:22-176.126.103.184:55022.service - OpenSSH per-connection server daemon (176.126.103.184:55022). Jan 16 21:09:54.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-64.23.236.65:22-176.126.103.184:55022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:54.235192 kernel: audit: type=1130 audit(1768597794.228:664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-64.23.236.65:22-176.126.103.184:55022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:54.862507 sshd[3061]: Invalid user user from 176.126.103.184 port 55022 Jan 16 21:09:55.053993 sshd[3061]: Connection closed by invalid user user 176.126.103.184 port 55022 [preauth] Jan 16 21:09:55.053000 audit[3061]: USER_ERR pid=3061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:55.057404 systemd[1]: sshd@160-64.23.236.65:22-176.126.103.184:55022.service: Deactivated successfully. Jan 16 21:09:55.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-64.23.236.65:22-176.126.103.184:55022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:55.060296 kernel: audit: type=1109 audit(1768597795.053:665): pid=3061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:55.060369 kernel: audit: type=1131 audit(1768597795.055:666): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-64.23.236.65:22-176.126.103.184:55022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:55.265611 systemd[1]: Started sshd@161-64.23.236.65:22-176.126.103.184:55032.service - OpenSSH per-connection server daemon (176.126.103.184:55032). Jan 16 21:09:55.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-64.23.236.65:22-176.126.103.184:55032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:55.270994 kernel: audit: type=1130 audit(1768597795.265:667): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-64.23.236.65:22-176.126.103.184:55032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:55.893171 sshd[3067]: Invalid user user from 176.126.103.184 port 55032 Jan 16 21:09:56.086004 sshd[3067]: Connection closed by invalid user user 176.126.103.184 port 55032 [preauth] Jan 16 21:09:56.085000 audit[3067]: USER_ERR pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:56.088459 systemd[1]: sshd@161-64.23.236.65:22-176.126.103.184:55032.service: Deactivated successfully. Jan 16 21:09:56.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-64.23.236.65:22-176.126.103.184:55032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:56.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-64.23.236.65:22-176.126.103.184:55040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:56.294480 systemd[1]: Started sshd@162-64.23.236.65:22-176.126.103.184:55040.service - OpenSSH per-connection server daemon (176.126.103.184:55040). Jan 16 21:09:56.921397 sshd[3073]: Invalid user user from 176.126.103.184 port 55040 Jan 16 21:09:57.113575 sshd[3073]: Connection closed by invalid user user 176.126.103.184 port 55040 [preauth] Jan 16 21:09:57.113000 audit[3073]: USER_ERR pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:57.116718 systemd[1]: sshd@162-64.23.236.65:22-176.126.103.184:55040.service: Deactivated successfully. Jan 16 21:09:57.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-64.23.236.65:22-176.126.103.184:55040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:57.320234 systemd[1]: Started sshd@163-64.23.236.65:22-176.126.103.184:55048.service - OpenSSH per-connection server daemon (176.126.103.184:55048). Jan 16 21:09:57.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-64.23.236.65:22-176.126.103.184:55048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:57.323978 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:09:57.324086 kernel: audit: type=1130 audit(1768597797.319:673): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-64.23.236.65:22-176.126.103.184:55048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:57.948319 sshd[3079]: Invalid user user from 176.126.103.184 port 55048 Jan 16 21:09:58.140980 sshd[3079]: Connection closed by invalid user user 176.126.103.184 port 55048 [preauth] Jan 16 21:09:58.140000 audit[3079]: USER_ERR pid=3079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:58.147653 kernel: audit: type=1109 audit(1768597798.140:674): pid=3079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:58.147794 kernel: audit: type=1131 audit(1768597798.145:675): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-64.23.236.65:22-176.126.103.184:55048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:58.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-64.23.236.65:22-176.126.103.184:55048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:58.146531 systemd[1]: sshd@163-64.23.236.65:22-176.126.103.184:55048.service: Deactivated successfully. Jan 16 21:09:58.343723 systemd[1]: Started sshd@164-64.23.236.65:22-176.126.103.184:55064.service - OpenSSH per-connection server daemon (176.126.103.184:55064). Jan 16 21:09:58.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-64.23.236.65:22-176.126.103.184:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:58.349253 kernel: audit: type=1130 audit(1768597798.343:676): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-64.23.236.65:22-176.126.103.184:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:58.949982 sshd[3085]: Invalid user user from 176.126.103.184 port 55064 Jan 16 21:09:59.138239 sshd[3085]: Connection closed by invalid user user 176.126.103.184 port 55064 [preauth] Jan 16 21:09:59.137000 audit[3085]: USER_ERR pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:59.141547 systemd[1]: sshd@164-64.23.236.65:22-176.126.103.184:55064.service: Deactivated successfully. Jan 16 21:09:59.143973 kernel: audit: type=1109 audit(1768597799.137:677): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:09:59.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-64.23.236.65:22-176.126.103.184:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:59.148989 kernel: audit: type=1131 audit(1768597799.141:678): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-64.23.236.65:22-176.126.103.184:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:59.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-64.23.236.65:22-176.126.103.184:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:59.342642 systemd[1]: Started sshd@165-64.23.236.65:22-176.126.103.184:55070.service - OpenSSH per-connection server daemon (176.126.103.184:55070). Jan 16 21:09:59.348146 kernel: audit: type=1130 audit(1768597799.341:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-64.23.236.65:22-176.126.103.184:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:09:59.963546 sshd[3091]: Invalid user user from 176.126.103.184 port 55070 Jan 16 21:10:00.152378 sshd[3091]: Connection closed by invalid user user 176.126.103.184 port 55070 [preauth] Jan 16 21:10:00.152000 audit[3091]: USER_ERR pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:00.157295 systemd[1]: sshd@165-64.23.236.65:22-176.126.103.184:55070.service: Deactivated successfully. Jan 16 21:10:00.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-64.23.236.65:22-176.126.103.184:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:00.161417 kernel: audit: type=1109 audit(1768597800.152:680): pid=3091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:00.161563 kernel: audit: type=1131 audit(1768597800.157:681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-64.23.236.65:22-176.126.103.184:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:00.357991 systemd[1]: Started sshd@166-64.23.236.65:22-176.126.103.184:55072.service - OpenSSH per-connection server daemon (176.126.103.184:55072). Jan 16 21:10:00.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-64.23.236.65:22-176.126.103.184:55072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:00.366655 kernel: audit: type=1130 audit(1768597800.357:682): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-64.23.236.65:22-176.126.103.184:55072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:00.979277 sshd[3097]: Invalid user user from 176.126.103.184 port 55072 Jan 16 21:10:01.168000 audit[3097]: USER_ERR pid=3097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:01.170640 sshd[3097]: Connection closed by invalid user user 176.126.103.184 port 55072 [preauth] Jan 16 21:10:01.174453 systemd[1]: sshd@166-64.23.236.65:22-176.126.103.184:55072.service: Deactivated successfully. Jan 16 21:10:01.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-64.23.236.65:22-176.126.103.184:55072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:01.378786 systemd[1]: Started sshd@167-64.23.236.65:22-176.126.103.184:55086.service - OpenSSH per-connection server daemon (176.126.103.184:55086). Jan 16 21:10:01.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-64.23.236.65:22-176.126.103.184:55086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:02.021605 sshd[3103]: Invalid user user from 176.126.103.184 port 55086 Jan 16 21:10:02.213343 sshd[3103]: Connection closed by invalid user user 176.126.103.184 port 55086 [preauth] Jan 16 21:10:02.213000 audit[3103]: USER_ERR pid=3103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:02.218080 systemd[1]: sshd@167-64.23.236.65:22-176.126.103.184:55086.service: Deactivated successfully. Jan 16 21:10:02.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-64.23.236.65:22-176.126.103.184:55086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:02.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-64.23.236.65:22-176.126.103.184:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:02.428483 systemd[1]: Started sshd@168-64.23.236.65:22-176.126.103.184:46158.service - OpenSSH per-connection server daemon (176.126.103.184:46158). Jan 16 21:10:02.431764 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:02.431903 kernel: audit: type=1130 audit(1768597802.427:688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-64.23.236.65:22-176.126.103.184:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:03.116353 sshd[3109]: Invalid user user from 176.126.103.184 port 46158 Jan 16 21:10:03.309861 sshd[3109]: Connection closed by invalid user user 176.126.103.184 port 46158 [preauth] Jan 16 21:10:03.309000 audit[3109]: USER_ERR pid=3109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:03.320219 kernel: audit: type=1109 audit(1768597803.309:689): pid=3109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:03.322684 systemd[1]: sshd@168-64.23.236.65:22-176.126.103.184:46158.service: Deactivated successfully. Jan 16 21:10:03.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-64.23.236.65:22-176.126.103.184:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:03.331497 kernel: audit: type=1131 audit(1768597803.322:690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-64.23.236.65:22-176.126.103.184:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:03.524534 systemd[1]: Started sshd@169-64.23.236.65:22-176.126.103.184:46168.service - OpenSSH per-connection server daemon (176.126.103.184:46168). Jan 16 21:10:03.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-64.23.236.65:22-176.126.103.184:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:03.534816 kernel: audit: type=1130 audit(1768597803.522:691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-64.23.236.65:22-176.126.103.184:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:04.187866 sshd[3115]: Invalid user user from 176.126.103.184 port 46168 Jan 16 21:10:04.379628 sshd[3115]: Connection closed by invalid user user 176.126.103.184 port 46168 [preauth] Jan 16 21:10:04.379000 audit[3115]: USER_ERR pid=3115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:04.384550 systemd[1]: sshd@169-64.23.236.65:22-176.126.103.184:46168.service: Deactivated successfully. Jan 16 21:10:04.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-64.23.236.65:22-176.126.103.184:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:04.389932 kernel: audit: type=1109 audit(1768597804.379:692): pid=3115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:04.390113 kernel: audit: type=1131 audit(1768597804.382:693): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-64.23.236.65:22-176.126.103.184:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:04.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-64.23.236.65:22-176.126.103.184:46174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:04.602472 systemd[1]: Started sshd@170-64.23.236.65:22-176.126.103.184:46174.service - OpenSSH per-connection server daemon (176.126.103.184:46174). Jan 16 21:10:04.610082 kernel: audit: type=1130 audit(1768597804.602:694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-64.23.236.65:22-176.126.103.184:46174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:05.228240 sshd[3121]: Invalid user user from 176.126.103.184 port 46174 Jan 16 21:10:05.417170 sshd[3121]: Connection closed by invalid user user 176.126.103.184 port 46174 [preauth] Jan 16 21:10:05.416000 audit[3121]: USER_ERR pid=3121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:05.421852 systemd[1]: sshd@170-64.23.236.65:22-176.126.103.184:46174.service: Deactivated successfully. Jan 16 21:10:05.423128 kernel: audit: type=1109 audit(1768597805.416:695): pid=3121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:05.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-64.23.236.65:22-176.126.103.184:46174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:05.428296 kernel: audit: type=1131 audit(1768597805.421:696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-64.23.236.65:22-176.126.103.184:46174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:05.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-64.23.236.65:22-176.126.103.184:46180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:05.623087 systemd[1]: Started sshd@171-64.23.236.65:22-176.126.103.184:46180.service - OpenSSH per-connection server daemon (176.126.103.184:46180). Jan 16 21:10:05.629102 kernel: audit: type=1130 audit(1768597805.622:697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-64.23.236.65:22-176.126.103.184:46180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:06.245987 sshd[3127]: Invalid user user from 176.126.103.184 port 46180 Jan 16 21:10:06.436713 sshd[3127]: Connection closed by invalid user user 176.126.103.184 port 46180 [preauth] Jan 16 21:10:06.436000 audit[3127]: USER_ERR pid=3127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:06.439494 systemd[1]: sshd@171-64.23.236.65:22-176.126.103.184:46180.service: Deactivated successfully. Jan 16 21:10:06.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-64.23.236.65:22-176.126.103.184:46180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:06.631756 systemd[1]: Started sshd@172-64.23.236.65:22-176.126.103.184:46182.service - OpenSSH per-connection server daemon (176.126.103.184:46182). Jan 16 21:10:06.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-64.23.236.65:22-176.126.103.184:46182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:07.233416 sshd[3133]: Invalid user user from 176.126.103.184 port 46182 Jan 16 21:10:07.418886 sshd[3133]: Connection closed by invalid user user 176.126.103.184 port 46182 [preauth] Jan 16 21:10:07.418000 audit[3133]: USER_ERR pid=3133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:07.421496 systemd[1]: sshd@172-64.23.236.65:22-176.126.103.184:46182.service: Deactivated successfully. Jan 16 21:10:07.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-64.23.236.65:22-176.126.103.184:46182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:07.629638 systemd[1]: Started sshd@173-64.23.236.65:22-176.126.103.184:46192.service - OpenSSH per-connection server daemon (176.126.103.184:46192). Jan 16 21:10:07.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-64.23.236.65:22-176.126.103.184:46192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:07.633988 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:07.634115 kernel: audit: type=1130 audit(1768597807.629:703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-64.23.236.65:22-176.126.103.184:46192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:08.265090 sshd[3139]: Invalid user user from 176.126.103.184 port 46192 Jan 16 21:10:08.459217 sshd[3139]: Connection closed by invalid user user 176.126.103.184 port 46192 [preauth] Jan 16 21:10:08.458000 audit[3139]: USER_ERR pid=3139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:08.463738 systemd[1]: sshd@173-64.23.236.65:22-176.126.103.184:46192.service: Deactivated successfully. Jan 16 21:10:08.465019 kernel: audit: type=1109 audit(1768597808.458:704): pid=3139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:08.465077 kernel: audit: type=1131 audit(1768597808.461:705): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-64.23.236.65:22-176.126.103.184:46192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:08.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-64.23.236.65:22-176.126.103.184:46192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:08.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-64.23.236.65:22-176.126.103.184:46196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:08.664254 systemd[1]: Started sshd@174-64.23.236.65:22-176.126.103.184:46196.service - OpenSSH per-connection server daemon (176.126.103.184:46196). Jan 16 21:10:08.670179 kernel: audit: type=1130 audit(1768597808.663:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-64.23.236.65:22-176.126.103.184:46196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:09.296164 sshd[3145]: Invalid user user from 176.126.103.184 port 46196 Jan 16 21:10:09.488629 sshd[3145]: Connection closed by invalid user user 176.126.103.184 port 46196 [preauth] Jan 16 21:10:09.488000 audit[3145]: USER_ERR pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:09.492107 systemd[1]: sshd@174-64.23.236.65:22-176.126.103.184:46196.service: Deactivated successfully. Jan 16 21:10:09.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-64.23.236.65:22-176.126.103.184:46196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:09.495419 kernel: audit: type=1109 audit(1768597809.488:707): pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:09.495492 kernel: audit: type=1131 audit(1768597809.491:708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-64.23.236.65:22-176.126.103.184:46196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:09.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-64.23.236.65:22-176.126.103.184:46198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:09.694477 systemd[1]: Started sshd@175-64.23.236.65:22-176.126.103.184:46198.service - OpenSSH per-connection server daemon (176.126.103.184:46198). Jan 16 21:10:09.700989 kernel: audit: type=1130 audit(1768597809.693:709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-64.23.236.65:22-176.126.103.184:46198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:10.312523 sshd[3151]: Invalid user user from 176.126.103.184 port 46198 Jan 16 21:10:10.502427 sshd[3151]: Connection closed by invalid user user 176.126.103.184 port 46198 [preauth] Jan 16 21:10:10.501000 audit[3151]: USER_ERR pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:10.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-64.23.236.65:22-176.126.103.184:46198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:10.506411 systemd[1]: sshd@175-64.23.236.65:22-176.126.103.184:46198.service: Deactivated successfully. Jan 16 21:10:10.508776 kernel: audit: type=1109 audit(1768597810.501:710): pid=3151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:10.510017 kernel: audit: type=1131 audit(1768597810.505:711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-64.23.236.65:22-176.126.103.184:46198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:10.709848 systemd[1]: Started sshd@176-64.23.236.65:22-176.126.103.184:46202.service - OpenSSH per-connection server daemon (176.126.103.184:46202). Jan 16 21:10:10.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-64.23.236.65:22-176.126.103.184:46202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:10.716224 kernel: audit: type=1130 audit(1768597810.709:712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-64.23.236.65:22-176.126.103.184:46202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:11.346912 sshd[3157]: Invalid user user from 176.126.103.184 port 46202 Jan 16 21:10:11.537268 sshd[3157]: Connection closed by invalid user user 176.126.103.184 port 46202 [preauth] Jan 16 21:10:11.536000 audit[3157]: USER_ERR pid=3157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:11.540135 systemd[1]: sshd@176-64.23.236.65:22-176.126.103.184:46202.service: Deactivated successfully. Jan 16 21:10:11.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-64.23.236.65:22-176.126.103.184:46202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:11.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-64.23.236.65:22-176.126.103.184:46210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:11.743323 systemd[1]: Started sshd@177-64.23.236.65:22-176.126.103.184:46210.service - OpenSSH per-connection server daemon (176.126.103.184:46210). Jan 16 21:10:12.380287 sshd[3163]: Invalid user user from 176.126.103.184 port 46210 Jan 16 21:10:12.573926 sshd[3163]: Connection closed by invalid user user 176.126.103.184 port 46210 [preauth] Jan 16 21:10:12.573000 audit[3163]: USER_ERR pid=3163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:12.576671 systemd[1]: sshd@177-64.23.236.65:22-176.126.103.184:46210.service: Deactivated successfully. Jan 16 21:10:12.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-64.23.236.65:22-176.126.103.184:46210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:12.937270 systemd[1]: Started sshd@178-64.23.236.65:22-176.126.103.184:38008.service - OpenSSH per-connection server daemon (176.126.103.184:38008). Jan 16 21:10:12.943979 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:12.944061 kernel: audit: type=1130 audit(1768597812.936:718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-64.23.236.65:22-176.126.103.184:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:12.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-64.23.236.65:22-176.126.103.184:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:13.546069 sshd[3169]: Invalid user user from 176.126.103.184 port 38008 Jan 16 21:10:13.734644 sshd[3169]: Connection closed by invalid user user 176.126.103.184 port 38008 [preauth] Jan 16 21:10:13.733000 audit[3169]: USER_ERR pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:13.737502 systemd[1]: sshd@178-64.23.236.65:22-176.126.103.184:38008.service: Deactivated successfully. Jan 16 21:10:13.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-64.23.236.65:22-176.126.103.184:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:13.743353 kernel: audit: type=1109 audit(1768597813.733:719): pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:13.743473 kernel: audit: type=1131 audit(1768597813.736:720): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-64.23.236.65:22-176.126.103.184:38008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:13.940387 systemd[1]: Started sshd@179-64.23.236.65:22-176.126.103.184:38012.service - OpenSSH per-connection server daemon (176.126.103.184:38012). Jan 16 21:10:13.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-64.23.236.65:22-176.126.103.184:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:13.947983 kernel: audit: type=1130 audit(1768597813.940:721): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-64.23.236.65:22-176.126.103.184:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:14.560523 sshd[3175]: Invalid user user from 176.126.103.184 port 38012 Jan 16 21:10:14.752059 sshd[3175]: Connection closed by invalid user user 176.126.103.184 port 38012 [preauth] Jan 16 21:10:14.751000 audit[3175]: USER_ERR pid=3175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:14.754917 systemd[1]: sshd@179-64.23.236.65:22-176.126.103.184:38012.service: Deactivated successfully. Jan 16 21:10:14.758008 kernel: audit: type=1109 audit(1768597814.751:722): pid=3175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:14.758101 kernel: audit: type=1131 audit(1768597814.754:723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-64.23.236.65:22-176.126.103.184:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:14.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-64.23.236.65:22-176.126.103.184:38012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:14.958424 systemd[1]: Started sshd@180-64.23.236.65:22-176.126.103.184:38018.service - OpenSSH per-connection server daemon (176.126.103.184:38018). Jan 16 21:10:14.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-64.23.236.65:22-176.126.103.184:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:14.965137 kernel: audit: type=1130 audit(1768597814.958:724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-64.23.236.65:22-176.126.103.184:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:15.578008 sshd[3181]: Invalid user user from 176.126.103.184 port 38018 Jan 16 21:10:15.768770 sshd[3181]: Connection closed by invalid user user 176.126.103.184 port 38018 [preauth] Jan 16 21:10:15.768000 audit[3181]: USER_ERR pid=3181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:15.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-64.23.236.65:22-176.126.103.184:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:15.772389 systemd[1]: sshd@180-64.23.236.65:22-176.126.103.184:38018.service: Deactivated successfully. Jan 16 21:10:15.775053 kernel: audit: type=1109 audit(1768597815.768:725): pid=3181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:15.775127 kernel: audit: type=1131 audit(1768597815.770:726): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-64.23.236.65:22-176.126.103.184:38018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:15.973788 systemd[1]: Started sshd@181-64.23.236.65:22-176.126.103.184:38024.service - OpenSSH per-connection server daemon (176.126.103.184:38024). Jan 16 21:10:15.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-64.23.236.65:22-176.126.103.184:38024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:15.981013 kernel: audit: type=1130 audit(1768597815.973:727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-64.23.236.65:22-176.126.103.184:38024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:16.596855 sshd[3188]: Invalid user user from 176.126.103.184 port 38024 Jan 16 21:10:16.786591 sshd[3188]: Connection closed by invalid user user 176.126.103.184 port 38024 [preauth] Jan 16 21:10:16.786000 audit[3188]: USER_ERR pid=3188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:16.789981 systemd[1]: sshd@181-64.23.236.65:22-176.126.103.184:38024.service: Deactivated successfully. Jan 16 21:10:16.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-64.23.236.65:22-176.126.103.184:38024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:16.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-64.23.236.65:22-176.126.103.184:38038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:16.991039 systemd[1]: Started sshd@182-64.23.236.65:22-176.126.103.184:38038.service - OpenSSH per-connection server daemon (176.126.103.184:38038). Jan 16 21:10:17.605178 sshd[3196]: Invalid user ubuntu from 176.126.103.184 port 38038 Jan 16 21:10:17.796134 sshd[3196]: Connection closed by invalid user ubuntu 176.126.103.184 port 38038 [preauth] Jan 16 21:10:17.795000 audit[3196]: USER_ERR pid=3196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:17.799231 systemd[1]: sshd@182-64.23.236.65:22-176.126.103.184:38038.service: Deactivated successfully. Jan 16 21:10:17.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-64.23.236.65:22-176.126.103.184:38038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:18.006612 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:18.006759 kernel: audit: type=1130 audit(1768597818.003:733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-64.23.236.65:22-176.126.103.184:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:18.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-64.23.236.65:22-176.126.103.184:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:18.004260 systemd[1]: Started sshd@183-64.23.236.65:22-176.126.103.184:38042.service - OpenSSH per-connection server daemon (176.126.103.184:38042). Jan 16 21:10:18.638964 sshd[3202]: Invalid user ubuntu from 176.126.103.184 port 38042 Jan 16 21:10:18.834000 audit[3202]: USER_ERR pid=3202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:18.838562 systemd[1]: sshd@183-64.23.236.65:22-176.126.103.184:38042.service: Deactivated successfully. Jan 16 21:10:18.840165 sshd[3202]: Connection closed by invalid user ubuntu 176.126.103.184 port 38042 [preauth] Jan 16 21:10:18.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-64.23.236.65:22-176.126.103.184:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:18.842038 kernel: audit: type=1109 audit(1768597818.834:734): pid=3202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:18.842146 kernel: audit: type=1131 audit(1768597818.837:735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-64.23.236.65:22-176.126.103.184:38042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:19.044281 systemd[1]: Started sshd@184-64.23.236.65:22-176.126.103.184:38046.service - OpenSSH per-connection server daemon (176.126.103.184:38046). Jan 16 21:10:19.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-64.23.236.65:22-176.126.103.184:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:19.050028 kernel: audit: type=1130 audit(1768597819.043:736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-64.23.236.65:22-176.126.103.184:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:19.670168 sshd[3208]: Invalid user ubuntu from 176.126.103.184 port 38046 Jan 16 21:10:19.862694 sshd[3208]: Connection closed by invalid user ubuntu 176.126.103.184 port 38046 [preauth] Jan 16 21:10:19.861000 audit[3208]: USER_ERR pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:19.865090 systemd[1]: sshd@184-64.23.236.65:22-176.126.103.184:38046.service: Deactivated successfully. Jan 16 21:10:19.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-64.23.236.65:22-176.126.103.184:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:19.869998 kernel: audit: type=1109 audit(1768597819.861:737): pid=3208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:19.870077 kernel: audit: type=1131 audit(1768597819.865:738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-64.23.236.65:22-176.126.103.184:38046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:20.066766 systemd[1]: Started sshd@185-64.23.236.65:22-176.126.103.184:38048.service - OpenSSH per-connection server daemon (176.126.103.184:38048). Jan 16 21:10:20.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-64.23.236.65:22-176.126.103.184:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:20.074135 kernel: audit: type=1130 audit(1768597820.066:739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-64.23.236.65:22-176.126.103.184:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:20.689534 sshd[3214]: Invalid user ubuntu from 176.126.103.184 port 38048 Jan 16 21:10:20.880020 sshd[3214]: Connection closed by invalid user ubuntu 176.126.103.184 port 38048 [preauth] Jan 16 21:10:20.879000 audit[3214]: USER_ERR pid=3214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:20.886467 kernel: audit: type=1109 audit(1768597820.879:740): pid=3214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:20.887182 systemd[1]: sshd@185-64.23.236.65:22-176.126.103.184:38048.service: Deactivated successfully. Jan 16 21:10:20.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-64.23.236.65:22-176.126.103.184:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:20.894131 kernel: audit: type=1131 audit(1768597820.886:741): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-64.23.236.65:22-176.126.103.184:38048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:21.090086 systemd[1]: Started sshd@186-64.23.236.65:22-176.126.103.184:38062.service - OpenSSH per-connection server daemon (176.126.103.184:38062). Jan 16 21:10:21.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-64.23.236.65:22-176.126.103.184:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:21.095973 kernel: audit: type=1130 audit(1768597821.089:742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-64.23.236.65:22-176.126.103.184:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:21.722793 sshd[3220]: Invalid user ubuntu from 176.126.103.184 port 38062 Jan 16 21:10:21.914033 sshd[3220]: Connection closed by invalid user ubuntu 176.126.103.184 port 38062 [preauth] Jan 16 21:10:21.913000 audit[3220]: USER_ERR pid=3220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:21.916901 systemd[1]: sshd@186-64.23.236.65:22-176.126.103.184:38062.service: Deactivated successfully. Jan 16 21:10:21.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-64.23.236.65:22-176.126.103.184:38062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:22.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-64.23.236.65:22-176.126.103.184:38076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:22.123369 systemd[1]: Started sshd@187-64.23.236.65:22-176.126.103.184:38076.service - OpenSSH per-connection server daemon (176.126.103.184:38076). Jan 16 21:10:22.734904 sshd[3226]: Invalid user ubuntu from 176.126.103.184 port 38076 Jan 16 21:10:22.927287 sshd[3226]: Connection closed by invalid user ubuntu 176.126.103.184 port 38076 [preauth] Jan 16 21:10:22.926000 audit[3226]: USER_ERR pid=3226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:22.930462 systemd[1]: sshd@187-64.23.236.65:22-176.126.103.184:38076.service: Deactivated successfully. Jan 16 21:10:22.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-64.23.236.65:22-176.126.103.184:38076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:23.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-64.23.236.65:22-176.126.103.184:53100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:23.133190 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:23.133242 kernel: audit: type=1130 audit(1768597823.131:748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-64.23.236.65:22-176.126.103.184:53100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:23.132334 systemd[1]: Started sshd@188-64.23.236.65:22-176.126.103.184:53100.service - OpenSSH per-connection server daemon (176.126.103.184:53100). Jan 16 21:10:23.752904 sshd[3232]: Invalid user ubuntu from 176.126.103.184 port 53100 Jan 16 21:10:23.945211 sshd[3232]: Connection closed by invalid user ubuntu 176.126.103.184 port 53100 [preauth] Jan 16 21:10:23.944000 audit[3232]: USER_ERR pid=3232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:23.948368 systemd[1]: sshd@188-64.23.236.65:22-176.126.103.184:53100.service: Deactivated successfully. Jan 16 21:10:23.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-64.23.236.65:22-176.126.103.184:53100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:23.952382 kernel: audit: type=1109 audit(1768597823.944:749): pid=3232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:23.952539 kernel: audit: type=1131 audit(1768597823.947:750): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-64.23.236.65:22-176.126.103.184:53100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:24.151281 systemd[1]: Started sshd@189-64.23.236.65:22-176.126.103.184:53102.service - OpenSSH per-connection server daemon (176.126.103.184:53102). Jan 16 21:10:24.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-64.23.236.65:22-176.126.103.184:53102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:24.158164 kernel: audit: type=1130 audit(1768597824.150:751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-64.23.236.65:22-176.126.103.184:53102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:24.773340 sshd[3238]: Invalid user ubuntu from 176.126.103.184 port 53102 Jan 16 21:10:24.963940 sshd[3238]: Connection closed by invalid user ubuntu 176.126.103.184 port 53102 [preauth] Jan 16 21:10:24.963000 audit[3238]: USER_ERR pid=3238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:24.967485 systemd[1]: sshd@189-64.23.236.65:22-176.126.103.184:53102.service: Deactivated successfully. Jan 16 21:10:24.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-64.23.236.65:22-176.126.103.184:53102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:24.971249 kernel: audit: type=1109 audit(1768597824.963:752): pid=3238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:24.971340 kernel: audit: type=1131 audit(1768597824.966:753): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-64.23.236.65:22-176.126.103.184:53102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:25.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-64.23.236.65:22-176.126.103.184:53118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:25.171405 systemd[1]: Started sshd@190-64.23.236.65:22-176.126.103.184:53118.service - OpenSSH per-connection server daemon (176.126.103.184:53118). Jan 16 21:10:25.175977 kernel: audit: type=1130 audit(1768597825.170:754): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-64.23.236.65:22-176.126.103.184:53118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:25.779713 sshd[3244]: Invalid user ubuntu from 176.126.103.184 port 53118 Jan 16 21:10:25.968294 sshd[3244]: Connection closed by invalid user ubuntu 176.126.103.184 port 53118 [preauth] Jan 16 21:10:25.968000 audit[3244]: USER_ERR pid=3244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:25.972645 systemd[1]: sshd@190-64.23.236.65:22-176.126.103.184:53118.service: Deactivated successfully. Jan 16 21:10:25.975008 kernel: audit: type=1109 audit(1768597825.968:755): pid=3244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:25.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-64.23.236.65:22-176.126.103.184:53118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:25.981007 kernel: audit: type=1131 audit(1768597825.972:756): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-64.23.236.65:22-176.126.103.184:53118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:26.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-64.23.236.65:22-176.126.103.184:53120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:26.171588 systemd[1]: Started sshd@191-64.23.236.65:22-176.126.103.184:53120.service - OpenSSH per-connection server daemon (176.126.103.184:53120). Jan 16 21:10:26.177399 kernel: audit: type=1130 audit(1768597826.170:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-64.23.236.65:22-176.126.103.184:53120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:26.784807 sshd[3250]: Invalid user ubuntu from 176.126.103.184 port 53120 Jan 16 21:10:26.972039 sshd[3250]: Connection closed by invalid user ubuntu 176.126.103.184 port 53120 [preauth] Jan 16 21:10:26.971000 audit[3250]: USER_ERR pid=3250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:26.975446 systemd[1]: sshd@191-64.23.236.65:22-176.126.103.184:53120.service: Deactivated successfully. Jan 16 21:10:26.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-64.23.236.65:22-176.126.103.184:53120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:27.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-64.23.236.65:22-176.126.103.184:53126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:27.171675 systemd[1]: Started sshd@192-64.23.236.65:22-176.126.103.184:53126.service - OpenSSH per-connection server daemon (176.126.103.184:53126). Jan 16 21:10:27.801300 sshd[3256]: Invalid user ubuntu from 176.126.103.184 port 53126 Jan 16 21:10:27.991740 sshd[3256]: Connection closed by invalid user ubuntu 176.126.103.184 port 53126 [preauth] Jan 16 21:10:27.991000 audit[3256]: USER_ERR pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:27.995880 systemd[1]: sshd@192-64.23.236.65:22-176.126.103.184:53126.service: Deactivated successfully. Jan 16 21:10:27.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-64.23.236.65:22-176.126.103.184:53126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:28.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-64.23.236.65:22-176.126.103.184:53134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:28.198445 systemd[1]: Started sshd@193-64.23.236.65:22-176.126.103.184:53134.service - OpenSSH per-connection server daemon (176.126.103.184:53134). Jan 16 21:10:28.200370 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:28.200503 kernel: audit: type=1130 audit(1768597828.197:763): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-64.23.236.65:22-176.126.103.184:53134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:28.819996 sshd[3262]: Invalid user ubuntu from 176.126.103.184 port 53134 Jan 16 21:10:29.012458 sshd[3262]: Connection closed by invalid user ubuntu 176.126.103.184 port 53134 [preauth] Jan 16 21:10:29.012000 audit[3262]: USER_ERR pid=3262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:29.016488 systemd[1]: sshd@193-64.23.236.65:22-176.126.103.184:53134.service: Deactivated successfully. Jan 16 21:10:29.019294 kernel: audit: type=1109 audit(1768597829.012:764): pid=3262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:29.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-64.23.236.65:22-176.126.103.184:53134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:29.024063 kernel: audit: type=1131 audit(1768597829.015:765): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-64.23.236.65:22-176.126.103.184:53134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:29.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-64.23.236.65:22-176.126.103.184:53138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:29.214284 systemd[1]: Started sshd@194-64.23.236.65:22-176.126.103.184:53138.service - OpenSSH per-connection server daemon (176.126.103.184:53138). Jan 16 21:10:29.218988 kernel: audit: type=1130 audit(1768597829.213:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-64.23.236.65:22-176.126.103.184:53138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:29.845287 sshd[3268]: Invalid user ubuntu from 176.126.103.184 port 53138 Jan 16 21:10:30.035171 sshd[3268]: Connection closed by invalid user ubuntu 176.126.103.184 port 53138 [preauth] Jan 16 21:10:30.034000 audit[3268]: USER_ERR pid=3268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:30.043289 kernel: audit: type=1109 audit(1768597830.034:767): pid=3268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:30.043436 kernel: audit: type=1131 audit(1768597830.041:768): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-64.23.236.65:22-176.126.103.184:53138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:30.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-64.23.236.65:22-176.126.103.184:53138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:30.042228 systemd[1]: sshd@194-64.23.236.65:22-176.126.103.184:53138.service: Deactivated successfully. Jan 16 21:10:30.242334 systemd[1]: Started sshd@195-64.23.236.65:22-176.126.103.184:53146.service - OpenSSH per-connection server daemon (176.126.103.184:53146). Jan 16 21:10:30.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-64.23.236.65:22-176.126.103.184:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:30.246991 kernel: audit: type=1130 audit(1768597830.241:769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-64.23.236.65:22-176.126.103.184:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:30.871748 sshd[3274]: Invalid user ubuntu from 176.126.103.184 port 53146 Jan 16 21:10:31.064733 sshd[3274]: Connection closed by invalid user ubuntu 176.126.103.184 port 53146 [preauth] Jan 16 21:10:31.063000 audit[3274]: USER_ERR pid=3274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:31.069012 kernel: audit: type=1109 audit(1768597831.063:770): pid=3274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:31.069402 systemd[1]: sshd@195-64.23.236.65:22-176.126.103.184:53146.service: Deactivated successfully. Jan 16 21:10:31.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-64.23.236.65:22-176.126.103.184:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:31.074981 kernel: audit: type=1131 audit(1768597831.068:771): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-64.23.236.65:22-176.126.103.184:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:31.261931 systemd[1]: Started sshd@196-64.23.236.65:22-176.126.103.184:53154.service - OpenSSH per-connection server daemon (176.126.103.184:53154). Jan 16 21:10:31.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-64.23.236.65:22-176.126.103.184:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:31.269071 kernel: audit: type=1130 audit(1768597831.261:772): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-64.23.236.65:22-176.126.103.184:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:31.873664 sshd[3280]: Invalid user ubuntu from 176.126.103.184 port 53154 Jan 16 21:10:32.063524 sshd[3280]: Connection closed by invalid user ubuntu 176.126.103.184 port 53154 [preauth] Jan 16 21:10:32.062000 audit[3280]: USER_ERR pid=3280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:32.066105 systemd[1]: sshd@196-64.23.236.65:22-176.126.103.184:53154.service: Deactivated successfully. Jan 16 21:10:32.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-64.23.236.65:22-176.126.103.184:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:32.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-64.23.236.65:22-176.126.103.184:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:32.275045 systemd[1]: Started sshd@197-64.23.236.65:22-176.126.103.184:41098.service - OpenSSH per-connection server daemon (176.126.103.184:41098). Jan 16 21:10:32.918159 sshd[3286]: Invalid user ubuntu from 176.126.103.184 port 41098 Jan 16 21:10:33.112005 sshd[3286]: Connection closed by invalid user ubuntu 176.126.103.184 port 41098 [preauth] Jan 16 21:10:33.111000 audit[3286]: USER_ERR pid=3286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:33.115110 systemd[1]: sshd@197-64.23.236.65:22-176.126.103.184:41098.service: Deactivated successfully. Jan 16 21:10:33.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-64.23.236.65:22-176.126.103.184:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:33.323660 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:33.323813 kernel: audit: type=1130 audit(1768597833.320:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-64.23.236.65:22-176.126.103.184:41110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:33.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-64.23.236.65:22-176.126.103.184:41110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:33.321486 systemd[1]: Started sshd@198-64.23.236.65:22-176.126.103.184:41110.service - OpenSSH per-connection server daemon (176.126.103.184:41110). Jan 16 21:10:33.965311 sshd[3292]: Invalid user ubuntu from 176.126.103.184 port 41110 Jan 16 21:10:34.160500 sshd[3292]: Connection closed by invalid user ubuntu 176.126.103.184 port 41110 [preauth] Jan 16 21:10:34.160000 audit[3292]: USER_ERR pid=3292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:34.167023 kernel: audit: type=1109 audit(1768597834.160:779): pid=3292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:34.169052 systemd[1]: sshd@198-64.23.236.65:22-176.126.103.184:41110.service: Deactivated successfully. Jan 16 21:10:34.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-64.23.236.65:22-176.126.103.184:41110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:34.175033 kernel: audit: type=1131 audit(1768597834.168:780): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-64.23.236.65:22-176.126.103.184:41110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:34.357808 systemd[1]: Started sshd@199-64.23.236.65:22-176.126.103.184:41124.service - OpenSSH per-connection server daemon (176.126.103.184:41124). Jan 16 21:10:34.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:34.363973 kernel: audit: type=1130 audit(1768597834.357:781): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:34.968771 sshd[3298]: Invalid user ubuntu from 176.126.103.184 port 41124 Jan 16 21:10:35.158016 sshd[3298]: Connection closed by invalid user ubuntu 176.126.103.184 port 41124 [preauth] Jan 16 21:10:35.157000 audit[3298]: USER_ERR pid=3298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:35.162891 systemd[1]: sshd@199-64.23.236.65:22-176.126.103.184:41124.service: Deactivated successfully. Jan 16 21:10:35.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:35.165985 kernel: audit: type=1109 audit(1768597835.157:782): pid=3298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:35.166050 kernel: audit: type=1131 audit(1768597835.162:783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-64.23.236.65:22-176.126.103.184:41124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:35.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-64.23.236.65:22-176.126.103.184:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:35.369039 systemd[1]: Started sshd@200-64.23.236.65:22-176.126.103.184:41136.service - OpenSSH per-connection server daemon (176.126.103.184:41136). Jan 16 21:10:35.375009 kernel: audit: type=1130 audit(1768597835.368:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-64.23.236.65:22-176.126.103.184:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:36.010426 sshd[3304]: Invalid user ubuntu from 176.126.103.184 port 41136 Jan 16 21:10:36.203184 sshd[3304]: Connection closed by invalid user ubuntu 176.126.103.184 port 41136 [preauth] Jan 16 21:10:36.202000 audit[3304]: USER_ERR pid=3304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:36.212006 kernel: audit: type=1109 audit(1768597836.202:785): pid=3304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:36.212121 kernel: audit: type=1131 audit(1768597836.209:786): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-64.23.236.65:22-176.126.103.184:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:36.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-64.23.236.65:22-176.126.103.184:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:36.210418 systemd[1]: sshd@200-64.23.236.65:22-176.126.103.184:41136.service: Deactivated successfully. Jan 16 21:10:36.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-64.23.236.65:22-176.126.103.184:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:36.411082 systemd[1]: Started sshd@201-64.23.236.65:22-176.126.103.184:41140.service - OpenSSH per-connection server daemon (176.126.103.184:41140). Jan 16 21:10:36.417183 kernel: audit: type=1130 audit(1768597836.410:787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-64.23.236.65:22-176.126.103.184:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:37.036680 sshd[3310]: Invalid user ubuntu from 176.126.103.184 port 41140 Jan 16 21:10:37.229011 sshd[3310]: Connection closed by invalid user ubuntu 176.126.103.184 port 41140 [preauth] Jan 16 21:10:37.228000 audit[3310]: USER_ERR pid=3310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:37.232211 systemd[1]: sshd@201-64.23.236.65:22-176.126.103.184:41140.service: Deactivated successfully. Jan 16 21:10:37.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-64.23.236.65:22-176.126.103.184:41140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:37.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-64.23.236.65:22-176.126.103.184:41146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:37.434311 systemd[1]: Started sshd@202-64.23.236.65:22-176.126.103.184:41146.service - OpenSSH per-connection server daemon (176.126.103.184:41146). Jan 16 21:10:38.059766 sshd[3316]: Invalid user ubuntu from 176.126.103.184 port 41146 Jan 16 21:10:38.251993 sshd[3316]: Connection closed by invalid user ubuntu 176.126.103.184 port 41146 [preauth] Jan 16 21:10:38.251000 audit[3316]: USER_ERR pid=3316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:38.254455 systemd[1]: sshd@202-64.23.236.65:22-176.126.103.184:41146.service: Deactivated successfully. Jan 16 21:10:38.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-64.23.236.65:22-176.126.103.184:41146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:38.456896 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:38.457016 kernel: audit: type=1130 audit(1768597838.453:793): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-64.23.236.65:22-176.126.103.184:41160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:38.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-64.23.236.65:22-176.126.103.184:41160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:38.454722 systemd[1]: Started sshd@203-64.23.236.65:22-176.126.103.184:41160.service - OpenSSH per-connection server daemon (176.126.103.184:41160). Jan 16 21:10:39.078217 sshd[3322]: Invalid user ubuntu from 176.126.103.184 port 41160 Jan 16 21:10:39.270760 sshd[3322]: Connection closed by invalid user ubuntu 176.126.103.184 port 41160 [preauth] Jan 16 21:10:39.269000 audit[3322]: USER_ERR pid=3322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:39.273379 systemd[1]: sshd@203-64.23.236.65:22-176.126.103.184:41160.service: Deactivated successfully. Jan 16 21:10:39.277988 kernel: audit: type=1109 audit(1768597839.269:794): pid=3322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:39.278085 kernel: audit: type=1131 audit(1768597839.272:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-64.23.236.65:22-176.126.103.184:41160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:39.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-64.23.236.65:22-176.126.103.184:41160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:39.482773 systemd[1]: Started sshd@204-64.23.236.65:22-176.126.103.184:41172.service - OpenSSH per-connection server daemon (176.126.103.184:41172). Jan 16 21:10:39.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-64.23.236.65:22-176.126.103.184:41172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:39.488655 kernel: audit: type=1130 audit(1768597839.483:796): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-64.23.236.65:22-176.126.103.184:41172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:40.101449 sshd[3328]: Invalid user ubuntu from 176.126.103.184 port 41172 Jan 16 21:10:40.290857 sshd[3328]: Connection closed by invalid user ubuntu 176.126.103.184 port 41172 [preauth] Jan 16 21:10:40.290000 audit[3328]: USER_ERR pid=3328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:40.294138 systemd[1]: sshd@204-64.23.236.65:22-176.126.103.184:41172.service: Deactivated successfully. Jan 16 21:10:40.296177 kernel: audit: type=1109 audit(1768597840.290:797): pid=3328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:40.296313 kernel: audit: type=1131 audit(1768597840.292:798): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-64.23.236.65:22-176.126.103.184:41172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:40.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-64.23.236.65:22-176.126.103.184:41172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:40.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-64.23.236.65:22-176.126.103.184:41176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:40.502071 kernel: audit: type=1130 audit(1768597840.496:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-64.23.236.65:22-176.126.103.184:41176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:40.497538 systemd[1]: Started sshd@205-64.23.236.65:22-176.126.103.184:41176.service - OpenSSH per-connection server daemon (176.126.103.184:41176). Jan 16 21:10:41.124731 sshd[3334]: Invalid user ubuntu from 176.126.103.184 port 41176 Jan 16 21:10:41.319115 sshd[3334]: Connection closed by invalid user ubuntu 176.126.103.184 port 41176 [preauth] Jan 16 21:10:41.318000 audit[3334]: USER_ERR pid=3334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:41.324971 kernel: audit: type=1109 audit(1768597841.318:800): pid=3334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:41.326085 systemd[1]: sshd@205-64.23.236.65:22-176.126.103.184:41176.service: Deactivated successfully. Jan 16 21:10:41.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-64.23.236.65:22-176.126.103.184:41176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:41.330982 kernel: audit: type=1131 audit(1768597841.325:801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-64.23.236.65:22-176.126.103.184:41176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:41.527755 systemd[1]: Started sshd@206-64.23.236.65:22-176.126.103.184:41182.service - OpenSSH per-connection server daemon (176.126.103.184:41182). Jan 16 21:10:41.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-64.23.236.65:22-176.126.103.184:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:41.533291 kernel: audit: type=1130 audit(1768597841.527:802): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-64.23.236.65:22-176.126.103.184:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:42.160816 sshd[3340]: Invalid user ubuntu from 176.126.103.184 port 41182 Jan 16 21:10:42.355018 sshd[3340]: Connection closed by invalid user ubuntu 176.126.103.184 port 41182 [preauth] Jan 16 21:10:42.354000 audit[3340]: USER_ERR pid=3340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:42.357903 systemd[1]: sshd@206-64.23.236.65:22-176.126.103.184:41182.service: Deactivated successfully. Jan 16 21:10:42.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-64.23.236.65:22-176.126.103.184:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:42.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-64.23.236.65:22-176.126.103.184:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:42.553450 systemd[1]: Started sshd@207-64.23.236.65:22-176.126.103.184:37912.service - OpenSSH per-connection server daemon (176.126.103.184:37912). Jan 16 21:10:43.171013 sshd[3346]: Invalid user ubuntu from 176.126.103.184 port 37912 Jan 16 21:10:43.361657 sshd[3346]: Connection closed by invalid user ubuntu 176.126.103.184 port 37912 [preauth] Jan 16 21:10:43.360000 audit[3346]: USER_ERR pid=3346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:43.364107 systemd[1]: sshd@207-64.23.236.65:22-176.126.103.184:37912.service: Deactivated successfully. Jan 16 21:10:43.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-64.23.236.65:22-176.126.103.184:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:43.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-64.23.236.65:22-176.126.103.184:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:43.570460 systemd[1]: Started sshd@208-64.23.236.65:22-176.126.103.184:37920.service - OpenSSH per-connection server daemon (176.126.103.184:37920). Jan 16 21:10:43.571364 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:43.571414 kernel: audit: type=1130 audit(1768597843.569:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-64.23.236.65:22-176.126.103.184:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:44.223036 sshd[3352]: Invalid user ubuntu from 176.126.103.184 port 37920 Jan 16 21:10:44.414983 sshd[3352]: Connection closed by invalid user ubuntu 176.126.103.184 port 37920 [preauth] Jan 16 21:10:44.414000 audit[3352]: USER_ERR pid=3352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:44.419441 systemd[1]: sshd@208-64.23.236.65:22-176.126.103.184:37920.service: Deactivated successfully. Jan 16 21:10:44.420323 kernel: audit: type=1109 audit(1768597844.414:809): pid=3352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:44.420403 kernel: audit: type=1131 audit(1768597844.418:810): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-64.23.236.65:22-176.126.103.184:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:44.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-64.23.236.65:22-176.126.103.184:37920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:44.624706 systemd[1]: Started sshd@209-64.23.236.65:22-176.126.103.184:37930.service - OpenSSH per-connection server daemon (176.126.103.184:37930). Jan 16 21:10:44.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-64.23.236.65:22-176.126.103.184:37930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:44.630098 kernel: audit: type=1130 audit(1768597844.624:811): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-64.23.236.65:22-176.126.103.184:37930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:45.269395 sshd[3358]: Invalid user ubuntu from 176.126.103.184 port 37930 Jan 16 21:10:45.465016 sshd[3358]: Connection closed by invalid user ubuntu 176.126.103.184 port 37930 [preauth] Jan 16 21:10:45.464000 audit[3358]: USER_ERR pid=3358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:45.470090 systemd[1]: sshd@209-64.23.236.65:22-176.126.103.184:37930.service: Deactivated successfully. Jan 16 21:10:45.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-64.23.236.65:22-176.126.103.184:37930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:45.473265 kernel: audit: type=1109 audit(1768597845.464:812): pid=3358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:45.473368 kernel: audit: type=1131 audit(1768597845.469:813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-64.23.236.65:22-176.126.103.184:37930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:45.674075 systemd[1]: Started sshd@210-64.23.236.65:22-176.126.103.184:37934.service - OpenSSH per-connection server daemon (176.126.103.184:37934). Jan 16 21:10:45.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-64.23.236.65:22-176.126.103.184:37934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:45.681006 kernel: audit: type=1130 audit(1768597845.673:814): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-64.23.236.65:22-176.126.103.184:37934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:46.315256 sshd[3364]: Invalid user ubuntu from 176.126.103.184 port 37934 Jan 16 21:10:46.509315 sshd[3364]: Connection closed by invalid user ubuntu 176.126.103.184 port 37934 [preauth] Jan 16 21:10:46.508000 audit[3364]: USER_ERR pid=3364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:46.514512 systemd[1]: sshd@210-64.23.236.65:22-176.126.103.184:37934.service: Deactivated successfully. Jan 16 21:10:46.514983 kernel: audit: type=1109 audit(1768597846.508:815): pid=3364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:46.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-64.23.236.65:22-176.126.103.184:37934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:46.522063 kernel: audit: type=1131 audit(1768597846.513:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-64.23.236.65:22-176.126.103.184:37934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:46.714252 systemd[1]: Started sshd@211-64.23.236.65:22-176.126.103.184:37950.service - OpenSSH per-connection server daemon (176.126.103.184:37950). Jan 16 21:10:46.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@211-64.23.236.65:22-176.126.103.184:37950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:46.719989 kernel: audit: type=1130 audit(1768597846.713:817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@211-64.23.236.65:22-176.126.103.184:37950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:47.338398 sshd[3370]: Invalid user ubuntu from 176.126.103.184 port 37950 Jan 16 21:10:47.531622 sshd[3370]: Connection closed by invalid user ubuntu 176.126.103.184 port 37950 [preauth] Jan 16 21:10:47.531000 audit[3370]: USER_ERR pid=3370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:47.534614 systemd[1]: sshd@211-64.23.236.65:22-176.126.103.184:37950.service: Deactivated successfully. Jan 16 21:10:47.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@211-64.23.236.65:22-176.126.103.184:37950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:47.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@212-64.23.236.65:22-176.126.103.184:37958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:47.735079 systemd[1]: Started sshd@212-64.23.236.65:22-176.126.103.184:37958.service - OpenSSH per-connection server daemon (176.126.103.184:37958). Jan 16 21:10:48.362555 sshd[3376]: Invalid user ubuntu from 176.126.103.184 port 37958 Jan 16 21:10:48.552613 sshd[3376]: Connection closed by invalid user ubuntu 176.126.103.184 port 37958 [preauth] Jan 16 21:10:48.553000 audit[3376]: USER_ERR pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:48.557004 systemd[1]: sshd@212-64.23.236.65:22-176.126.103.184:37958.service: Deactivated successfully. Jan 16 21:10:48.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@212-64.23.236.65:22-176.126.103.184:37958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:48.769673 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:48.769799 kernel: audit: type=1130 audit(1768597848.763:823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-64.23.236.65:22-176.126.103.184:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:48.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-64.23.236.65:22-176.126.103.184:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:48.764540 systemd[1]: Started sshd@213-64.23.236.65:22-176.126.103.184:37974.service - OpenSSH per-connection server daemon (176.126.103.184:37974). Jan 16 21:10:49.378283 sshd[3382]: Invalid user ubuntu from 176.126.103.184 port 37974 Jan 16 21:10:49.567461 sshd[3382]: Connection closed by invalid user ubuntu 176.126.103.184 port 37974 [preauth] Jan 16 21:10:49.566000 audit[3382]: USER_ERR pid=3382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:49.571499 systemd[1]: sshd@213-64.23.236.65:22-176.126.103.184:37974.service: Deactivated successfully. Jan 16 21:10:49.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-64.23.236.65:22-176.126.103.184:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:49.574406 kernel: audit: type=1109 audit(1768597849.566:824): pid=3382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:49.574516 kernel: audit: type=1131 audit(1768597849.569:825): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-64.23.236.65:22-176.126.103.184:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:49.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-64.23.236.65:22-176.126.103.184:37988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:49.772759 systemd[1]: Started sshd@214-64.23.236.65:22-176.126.103.184:37988.service - OpenSSH per-connection server daemon (176.126.103.184:37988). Jan 16 21:10:49.779001 kernel: audit: type=1130 audit(1768597849.772:826): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-64.23.236.65:22-176.126.103.184:37988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:50.402549 sshd[3388]: Invalid user ubuntu from 176.126.103.184 port 37988 Jan 16 21:10:50.594374 sshd[3388]: Connection closed by invalid user ubuntu 176.126.103.184 port 37988 [preauth] Jan 16 21:10:50.593000 audit[3388]: USER_ERR pid=3388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:50.599569 systemd[1]: sshd@214-64.23.236.65:22-176.126.103.184:37988.service: Deactivated successfully. Jan 16 21:10:50.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-64.23.236.65:22-176.126.103.184:37988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:50.603345 kernel: audit: type=1109 audit(1768597850.593:827): pid=3388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:50.603403 kernel: audit: type=1131 audit(1768597850.599:828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-64.23.236.65:22-176.126.103.184:37988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:50.808153 systemd[1]: Started sshd@215-64.23.236.65:22-176.126.103.184:38004.service - OpenSSH per-connection server daemon (176.126.103.184:38004). Jan 16 21:10:50.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-64.23.236.65:22-176.126.103.184:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:50.815006 kernel: audit: type=1130 audit(1768597850.807:829): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-64.23.236.65:22-176.126.103.184:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:51.427860 sshd[3394]: Invalid user ubuntu from 176.126.103.184 port 38004 Jan 16 21:10:51.620803 sshd[3394]: Connection closed by invalid user ubuntu 176.126.103.184 port 38004 [preauth] Jan 16 21:10:51.620000 audit[3394]: USER_ERR pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:51.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-64.23.236.65:22-176.126.103.184:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:51.625448 systemd[1]: sshd@215-64.23.236.65:22-176.126.103.184:38004.service: Deactivated successfully. Jan 16 21:10:51.627835 kernel: audit: type=1109 audit(1768597851.620:830): pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:51.627922 kernel: audit: type=1131 audit(1768597851.624:831): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-64.23.236.65:22-176.126.103.184:38004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:51.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-64.23.236.65:22-176.126.103.184:38020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:51.815510 systemd[1]: Started sshd@216-64.23.236.65:22-176.126.103.184:38020.service - OpenSSH per-connection server daemon (176.126.103.184:38020). Jan 16 21:10:51.819996 kernel: audit: type=1130 audit(1768597851.814:832): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-64.23.236.65:22-176.126.103.184:38020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:52.426347 sshd[3400]: Invalid user ubuntu from 176.126.103.184 port 38020 Jan 16 21:10:52.613481 sshd[3400]: Connection closed by invalid user ubuntu 176.126.103.184 port 38020 [preauth] Jan 16 21:10:52.613000 audit[3400]: USER_ERR pid=3400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:52.617092 systemd[1]: sshd@216-64.23.236.65:22-176.126.103.184:38020.service: Deactivated successfully. Jan 16 21:10:52.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-64.23.236.65:22-176.126.103.184:38020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:52.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-64.23.236.65:22-176.126.103.184:38252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:52.816505 systemd[1]: Started sshd@217-64.23.236.65:22-176.126.103.184:38252.service - OpenSSH per-connection server daemon (176.126.103.184:38252). Jan 16 21:10:53.426287 sshd[3406]: Invalid user ubuntu from 176.126.103.184 port 38252 Jan 16 21:10:53.616026 sshd[3406]: Connection closed by invalid user ubuntu 176.126.103.184 port 38252 [preauth] Jan 16 21:10:53.615000 audit[3406]: USER_ERR pid=3406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:53.619082 systemd[1]: sshd@217-64.23.236.65:22-176.126.103.184:38252.service: Deactivated successfully. Jan 16 21:10:53.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-64.23.236.65:22-176.126.103.184:38252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:53.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-64.23.236.65:22-176.126.103.184:38266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:53.830281 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:53.830331 kernel: audit: type=1130 audit(1768597853.827:838): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-64.23.236.65:22-176.126.103.184:38266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:53.828450 systemd[1]: Started sshd@218-64.23.236.65:22-176.126.103.184:38266.service - OpenSSH per-connection server daemon (176.126.103.184:38266). Jan 16 21:10:54.456701 sshd[3412]: Invalid user ubuntu from 176.126.103.184 port 38266 Jan 16 21:10:54.649294 sshd[3412]: Connection closed by invalid user ubuntu 176.126.103.184 port 38266 [preauth] Jan 16 21:10:54.648000 audit[3412]: USER_ERR pid=3412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:54.652964 systemd[1]: sshd@218-64.23.236.65:22-176.126.103.184:38266.service: Deactivated successfully. Jan 16 21:10:54.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-64.23.236.65:22-176.126.103.184:38266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:54.656534 kernel: audit: type=1109 audit(1768597854.648:839): pid=3412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:54.656634 kernel: audit: type=1131 audit(1768597854.652:840): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-64.23.236.65:22-176.126.103.184:38266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:54.851657 systemd[1]: Started sshd@219-64.23.236.65:22-176.126.103.184:38270.service - OpenSSH per-connection server daemon (176.126.103.184:38270). Jan 16 21:10:54.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-64.23.236.65:22-176.126.103.184:38270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:54.857997 kernel: audit: type=1130 audit(1768597854.851:841): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-64.23.236.65:22-176.126.103.184:38270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:55.463358 sshd[3418]: Invalid user ubuntu from 176.126.103.184 port 38270 Jan 16 21:10:55.653017 sshd[3418]: Connection closed by invalid user ubuntu 176.126.103.184 port 38270 [preauth] Jan 16 21:10:55.652000 audit[3418]: USER_ERR pid=3418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:55.657567 systemd[1]: sshd@219-64.23.236.65:22-176.126.103.184:38270.service: Deactivated successfully. Jan 16 21:10:55.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-64.23.236.65:22-176.126.103.184:38270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:55.660627 kernel: audit: type=1109 audit(1768597855.652:842): pid=3418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:55.660697 kernel: audit: type=1131 audit(1768597855.655:843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-64.23.236.65:22-176.126.103.184:38270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:55.857874 systemd[1]: Started sshd@220-64.23.236.65:22-176.126.103.184:38274.service - OpenSSH per-connection server daemon (176.126.103.184:38274). Jan 16 21:10:55.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-64.23.236.65:22-176.126.103.184:38274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:55.865101 kernel: audit: type=1130 audit(1768597855.857:844): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-64.23.236.65:22-176.126.103.184:38274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:56.479867 sshd[3424]: Invalid user ubuntu from 176.126.103.184 port 38274 Jan 16 21:10:56.668262 sshd[3424]: Connection closed by invalid user ubuntu 176.126.103.184 port 38274 [preauth] Jan 16 21:10:56.667000 audit[3424]: USER_ERR pid=3424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:56.671513 systemd[1]: sshd@220-64.23.236.65:22-176.126.103.184:38274.service: Deactivated successfully. Jan 16 21:10:56.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-64.23.236.65:22-176.126.103.184:38274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:56.675683 kernel: audit: type=1109 audit(1768597856.667:845): pid=3424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:56.675772 kernel: audit: type=1131 audit(1768597856.670:846): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-64.23.236.65:22-176.126.103.184:38274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:56.891234 systemd[1]: Started sshd@221-64.23.236.65:22-176.126.103.184:38284.service - OpenSSH per-connection server daemon (176.126.103.184:38284). Jan 16 21:10:56.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-64.23.236.65:22-176.126.103.184:38284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:56.898002 kernel: audit: type=1130 audit(1768597856.890:847): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-64.23.236.65:22-176.126.103.184:38284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:57.512495 sshd[3430]: Invalid user ubuntu from 176.126.103.184 port 38284 Jan 16 21:10:57.704851 sshd[3430]: Connection closed by invalid user ubuntu 176.126.103.184 port 38284 [preauth] Jan 16 21:10:57.704000 audit[3430]: USER_ERR pid=3430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:57.708271 systemd[1]: sshd@221-64.23.236.65:22-176.126.103.184:38284.service: Deactivated successfully. Jan 16 21:10:57.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-64.23.236.65:22-176.126.103.184:38284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:57.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@222-64.23.236.65:22-176.126.103.184:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:57.898196 systemd[1]: Started sshd@222-64.23.236.65:22-176.126.103.184:38292.service - OpenSSH per-connection server daemon (176.126.103.184:38292). Jan 16 21:10:58.493541 sshd[3436]: Invalid user ubuntu from 176.126.103.184 port 38292 Jan 16 21:10:58.676824 sshd[3436]: Connection closed by invalid user ubuntu 176.126.103.184 port 38292 [preauth] Jan 16 21:10:58.676000 audit[3436]: USER_ERR pid=3436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:58.679378 systemd[1]: sshd@222-64.23.236.65:22-176.126.103.184:38292.service: Deactivated successfully. Jan 16 21:10:58.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@222-64.23.236.65:22-176.126.103.184:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:58.877568 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:10:58.877692 kernel: audit: type=1130 audit(1768597858.874:853): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-64.23.236.65:22-176.126.103.184:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:58.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-64.23.236.65:22-176.126.103.184:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:58.875277 systemd[1]: Started sshd@223-64.23.236.65:22-176.126.103.184:38300.service - OpenSSH per-connection server daemon (176.126.103.184:38300). Jan 16 21:10:59.483918 sshd[3442]: Invalid user ubuntu from 176.126.103.184 port 38300 Jan 16 21:10:59.670012 sshd[3442]: Connection closed by invalid user ubuntu 176.126.103.184 port 38300 [preauth] Jan 16 21:10:59.669000 audit[3442]: USER_ERR pid=3442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:59.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-64.23.236.65:22-176.126.103.184:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:59.674555 systemd[1]: sshd@223-64.23.236.65:22-176.126.103.184:38300.service: Deactivated successfully. Jan 16 21:10:59.676930 kernel: audit: type=1109 audit(1768597859.669:854): pid=3442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:10:59.677520 kernel: audit: type=1131 audit(1768597859.673:855): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-64.23.236.65:22-176.126.103.184:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:59.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-64.23.236.65:22-176.126.103.184:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:10:59.870998 systemd[1]: Started sshd@224-64.23.236.65:22-176.126.103.184:38316.service - OpenSSH per-connection server daemon (176.126.103.184:38316). Jan 16 21:10:59.876993 kernel: audit: type=1130 audit(1768597859.870:856): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-64.23.236.65:22-176.126.103.184:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:00.479477 sshd[3448]: Invalid user ubuntu from 176.126.103.184 port 38316 Jan 16 21:11:00.663545 sshd[3448]: Connection closed by invalid user ubuntu 176.126.103.184 port 38316 [preauth] Jan 16 21:11:00.663000 audit[3448]: USER_ERR pid=3448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:00.674123 kernel: audit: type=1109 audit(1768597860.663:857): pid=3448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:00.674254 kernel: audit: type=1131 audit(1768597860.669:858): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-64.23.236.65:22-176.126.103.184:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:00.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-64.23.236.65:22-176.126.103.184:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:00.669587 systemd[1]: sshd@224-64.23.236.65:22-176.126.103.184:38316.service: Deactivated successfully. Jan 16 21:11:00.872419 systemd[1]: Started sshd@225-64.23.236.65:22-176.126.103.184:38320.service - OpenSSH per-connection server daemon (176.126.103.184:38320). Jan 16 21:11:00.877619 kernel: audit: type=1130 audit(1768597860.871:859): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-64.23.236.65:22-176.126.103.184:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:00.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-64.23.236.65:22-176.126.103.184:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:01.489058 sshd[3454]: Invalid user ubuntu from 176.126.103.184 port 38320 Jan 16 21:11:01.681020 sshd[3454]: Connection closed by invalid user ubuntu 176.126.103.184 port 38320 [preauth] Jan 16 21:11:01.680000 audit[3454]: USER_ERR pid=3454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:01.685621 systemd[1]: sshd@225-64.23.236.65:22-176.126.103.184:38320.service: Deactivated successfully. Jan 16 21:11:01.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-64.23.236.65:22-176.126.103.184:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:01.689206 kernel: audit: type=1109 audit(1768597861.680:860): pid=3454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:01.689342 kernel: audit: type=1131 audit(1768597861.683:861): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-64.23.236.65:22-176.126.103.184:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:01.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@226-64.23.236.65:22-176.126.103.184:38322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:01.894354 systemd[1]: Started sshd@226-64.23.236.65:22-176.126.103.184:38322.service - OpenSSH per-connection server daemon (176.126.103.184:38322). Jan 16 21:11:01.901991 kernel: audit: type=1130 audit(1768597861.893:862): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@226-64.23.236.65:22-176.126.103.184:38322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:02.529735 sshd[3460]: Invalid user ubuntu from 176.126.103.184 port 38322 Jan 16 21:11:02.724113 sshd[3460]: Connection closed by invalid user ubuntu 176.126.103.184 port 38322 [preauth] Jan 16 21:11:02.723000 audit[3460]: USER_ERR pid=3460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:02.727598 systemd[1]: sshd@226-64.23.236.65:22-176.126.103.184:38322.service: Deactivated successfully. Jan 16 21:11:02.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@226-64.23.236.65:22-176.126.103.184:38322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:02.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@227-64.23.236.65:22-176.126.103.184:38402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:02.928140 systemd[1]: Started sshd@227-64.23.236.65:22-176.126.103.184:38402.service - OpenSSH per-connection server daemon (176.126.103.184:38402). Jan 16 21:11:03.557894 sshd[3466]: Invalid user ubuntu from 176.126.103.184 port 38402 Jan 16 21:11:03.751865 sshd[3466]: Connection closed by invalid user ubuntu 176.126.103.184 port 38402 [preauth] Jan 16 21:11:03.751000 audit[3466]: USER_ERR pid=3466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:03.755370 systemd[1]: sshd@227-64.23.236.65:22-176.126.103.184:38402.service: Deactivated successfully. Jan 16 21:11:03.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@227-64.23.236.65:22-176.126.103.184:38402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:03.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-64.23.236.65:22-176.126.103.184:38418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:03.956149 systemd[1]: Started sshd@228-64.23.236.65:22-176.126.103.184:38418.service - OpenSSH per-connection server daemon (176.126.103.184:38418). Jan 16 21:11:03.957690 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:11:03.957745 kernel: audit: type=1130 audit(1768597863.955:868): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-64.23.236.65:22-176.126.103.184:38418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:04.582149 sshd[3472]: Invalid user ubuntu from 176.126.103.184 port 38418 Jan 16 21:11:04.772586 sshd[3472]: Connection closed by invalid user ubuntu 176.126.103.184 port 38418 [preauth] Jan 16 21:11:04.776691 systemd[1]: sshd@228-64.23.236.65:22-176.126.103.184:38418.service: Deactivated successfully. Jan 16 21:11:04.772000 audit[3472]: USER_ERR pid=3472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:04.786001 kernel: audit: type=1109 audit(1768597864.772:869): pid=3472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:04.786144 kernel: audit: type=1131 audit(1768597864.772:870): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-64.23.236.65:22-176.126.103.184:38418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:04.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-64.23.236.65:22-176.126.103.184:38418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:04.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-64.23.236.65:22-176.126.103.184:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:04.972086 systemd[1]: Started sshd@229-64.23.236.65:22-176.126.103.184:38420.service - OpenSSH per-connection server daemon (176.126.103.184:38420). Jan 16 21:11:04.977973 kernel: audit: type=1130 audit(1768597864.971:871): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-64.23.236.65:22-176.126.103.184:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:05.582284 sshd[3478]: Invalid user ubuntu from 176.126.103.184 port 38420 Jan 16 21:11:05.769540 sshd[3478]: Connection closed by invalid user ubuntu 176.126.103.184 port 38420 [preauth] Jan 16 21:11:05.774983 kernel: audit: type=1109 audit(1768597865.769:872): pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:05.769000 audit[3478]: USER_ERR pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:05.777007 systemd[1]: sshd@229-64.23.236.65:22-176.126.103.184:38420.service: Deactivated successfully. Jan 16 21:11:05.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-64.23.236.65:22-176.126.103.184:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:05.781989 kernel: audit: type=1131 audit(1768597865.776:873): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-64.23.236.65:22-176.126.103.184:38420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:05.980916 systemd[1]: Started sshd@230-64.23.236.65:22-176.126.103.184:38426.service - OpenSSH per-connection server daemon (176.126.103.184:38426). Jan 16 21:11:05.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-64.23.236.65:22-176.126.103.184:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:05.986007 kernel: audit: type=1130 audit(1768597865.980:874): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-64.23.236.65:22-176.126.103.184:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:06.605565 sshd[3484]: Invalid user ubuntu from 176.126.103.184 port 38426 Jan 16 21:11:06.799008 sshd[3484]: Connection closed by invalid user ubuntu 176.126.103.184 port 38426 [preauth] Jan 16 21:11:06.798000 audit[3484]: USER_ERR pid=3484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:06.802531 systemd[1]: sshd@230-64.23.236.65:22-176.126.103.184:38426.service: Deactivated successfully. Jan 16 21:11:06.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-64.23.236.65:22-176.126.103.184:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:06.806058 kernel: audit: type=1109 audit(1768597866.798:875): pid=3484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:06.806188 kernel: audit: type=1131 audit(1768597866.800:876): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-64.23.236.65:22-176.126.103.184:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:07.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-64.23.236.65:22-176.126.103.184:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:07.006996 systemd[1]: Started sshd@231-64.23.236.65:22-176.126.103.184:38432.service - OpenSSH per-connection server daemon (176.126.103.184:38432). Jan 16 21:11:07.013068 kernel: audit: type=1130 audit(1768597867.006:877): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-64.23.236.65:22-176.126.103.184:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:07.634116 sshd[3490]: Invalid user ubuntu from 176.126.103.184 port 38432 Jan 16 21:11:07.824886 sshd[3490]: Connection closed by invalid user ubuntu 176.126.103.184 port 38432 [preauth] Jan 16 21:11:07.824000 audit[3490]: USER_ERR pid=3490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:07.828640 systemd[1]: sshd@231-64.23.236.65:22-176.126.103.184:38432.service: Deactivated successfully. Jan 16 21:11:07.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-64.23.236.65:22-176.126.103.184:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:08.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@232-64.23.236.65:22-176.126.103.184:38446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:08.032331 systemd[1]: Started sshd@232-64.23.236.65:22-176.126.103.184:38446.service - OpenSSH per-connection server daemon (176.126.103.184:38446). Jan 16 21:11:08.652719 sshd[3496]: Invalid user ubuntu from 176.126.103.184 port 38446 Jan 16 21:11:08.846870 sshd[3496]: Connection closed by invalid user ubuntu 176.126.103.184 port 38446 [preauth] Jan 16 21:11:08.846000 audit[3496]: USER_ERR pid=3496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:08.849683 systemd[1]: sshd@232-64.23.236.65:22-176.126.103.184:38446.service: Deactivated successfully. Jan 16 21:11:08.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@232-64.23.236.65:22-176.126.103.184:38446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:09.049525 systemd[1]: Started sshd@233-64.23.236.65:22-176.126.103.184:38448.service - OpenSSH per-connection server daemon (176.126.103.184:38448). Jan 16 21:11:09.055308 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:11:09.055413 kernel: audit: type=1130 audit(1768597869.049:883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-64.23.236.65:22-176.126.103.184:38448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:09.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-64.23.236.65:22-176.126.103.184:38448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:09.671572 sshd[3502]: Invalid user ubuntu from 176.126.103.184 port 38448 Jan 16 21:11:09.866148 sshd[3502]: Connection closed by invalid user ubuntu 176.126.103.184 port 38448 [preauth] Jan 16 21:11:09.865000 audit[3502]: USER_ERR pid=3502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:09.868351 systemd[1]: sshd@233-64.23.236.65:22-176.126.103.184:38448.service: Deactivated successfully. Jan 16 21:11:09.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-64.23.236.65:22-176.126.103.184:38448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:09.873215 kernel: audit: type=1109 audit(1768597869.865:884): pid=3502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:09.873305 kernel: audit: type=1131 audit(1768597869.867:885): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-64.23.236.65:22-176.126.103.184:38448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:10.069867 systemd[1]: Started sshd@234-64.23.236.65:22-176.126.103.184:38458.service - OpenSSH per-connection server daemon (176.126.103.184:38458). Jan 16 21:11:10.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-64.23.236.65:22-176.126.103.184:38458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:10.076045 kernel: audit: type=1130 audit(1768597870.068:886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-64.23.236.65:22-176.126.103.184:38458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:10.681048 sshd[3508]: Invalid user ubuntu from 176.126.103.184 port 38458 Jan 16 21:11:10.868996 sshd[3508]: Connection closed by invalid user ubuntu 176.126.103.184 port 38458 [preauth] Jan 16 21:11:10.867000 audit[3508]: USER_ERR pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:10.873985 kernel: audit: type=1109 audit(1768597870.867:887): pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:10.874194 kernel: audit: type=1131 audit(1768597870.870:888): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-64.23.236.65:22-176.126.103.184:38458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:10.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-64.23.236.65:22-176.126.103.184:38458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:10.872431 systemd[1]: sshd@234-64.23.236.65:22-176.126.103.184:38458.service: Deactivated successfully. Jan 16 21:11:11.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-64.23.236.65:22-176.126.103.184:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:11.078585 systemd[1]: Started sshd@235-64.23.236.65:22-176.126.103.184:38470.service - OpenSSH per-connection server daemon (176.126.103.184:38470). Jan 16 21:11:11.083988 kernel: audit: type=1130 audit(1768597871.076:889): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-64.23.236.65:22-176.126.103.184:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:11.698237 sshd[3514]: Invalid user ubuntu from 176.126.103.184 port 38470 Jan 16 21:11:11.890080 sshd[3514]: Connection closed by invalid user ubuntu 176.126.103.184 port 38470 [preauth] Jan 16 21:11:11.888000 audit[3514]: USER_ERR pid=3514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:11.897014 kernel: audit: type=1109 audit(1768597871.888:890): pid=3514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:11.896916 systemd[1]: sshd@235-64.23.236.65:22-176.126.103.184:38470.service: Deactivated successfully. Jan 16 21:11:11.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-64.23.236.65:22-176.126.103.184:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:11.904190 kernel: audit: type=1131 audit(1768597871.895:891): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-64.23.236.65:22-176.126.103.184:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:12.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-64.23.236.65:22-176.126.103.184:38484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:12.090773 systemd[1]: Started sshd@236-64.23.236.65:22-176.126.103.184:38484.service - OpenSSH per-connection server daemon (176.126.103.184:38484). Jan 16 21:11:12.096003 kernel: audit: type=1130 audit(1768597872.089:892): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-64.23.236.65:22-176.126.103.184:38484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:12.708400 sshd[3520]: Invalid user ubuntu from 176.126.103.184 port 38484 Jan 16 21:11:12.897614 sshd[3520]: Connection closed by invalid user ubuntu 176.126.103.184 port 38484 [preauth] Jan 16 21:11:12.896000 audit[3520]: USER_ERR pid=3520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:12.900642 systemd[1]: sshd@236-64.23.236.65:22-176.126.103.184:38484.service: Deactivated successfully. Jan 16 21:11:12.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-64.23.236.65:22-176.126.103.184:38484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:13.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@237-64.23.236.65:22-176.126.103.184:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:13.105230 systemd[1]: Started sshd@237-64.23.236.65:22-176.126.103.184:60786.service - OpenSSH per-connection server daemon (176.126.103.184:60786). Jan 16 21:11:13.721830 sshd[3526]: Invalid user ubuntu from 176.126.103.184 port 60786 Jan 16 21:11:13.913711 sshd[3526]: Connection closed by invalid user ubuntu 176.126.103.184 port 60786 [preauth] Jan 16 21:11:13.912000 audit[3526]: USER_ERR pid=3526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:13.916398 systemd[1]: sshd@237-64.23.236.65:22-176.126.103.184:60786.service: Deactivated successfully. Jan 16 21:11:13.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@237-64.23.236.65:22-176.126.103.184:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:14.133847 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:11:14.134011 kernel: audit: type=1130 audit(1768597874.127:898): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-64.23.236.65:22-176.126.103.184:60798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:14.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-64.23.236.65:22-176.126.103.184:60798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:14.128354 systemd[1]: Started sshd@238-64.23.236.65:22-176.126.103.184:60798.service - OpenSSH per-connection server daemon (176.126.103.184:60798). Jan 16 21:11:14.757601 sshd[3532]: Invalid user ubuntu from 176.126.103.184 port 60798 Jan 16 21:11:14.950967 sshd[3532]: Connection closed by invalid user ubuntu 176.126.103.184 port 60798 [preauth] Jan 16 21:11:14.950000 audit[3532]: USER_ERR pid=3532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:14.954328 systemd[1]: sshd@238-64.23.236.65:22-176.126.103.184:60798.service: Deactivated successfully. Jan 16 21:11:14.955968 kernel: audit: type=1109 audit(1768597874.950:899): pid=3532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:14.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-64.23.236.65:22-176.126.103.184:60798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:14.959992 kernel: audit: type=1131 audit(1768597874.954:900): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-64.23.236.65:22-176.126.103.184:60798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:15.153156 systemd[1]: Started sshd@239-64.23.236.65:22-176.126.103.184:60804.service - OpenSSH per-connection server daemon (176.126.103.184:60804). Jan 16 21:11:15.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-64.23.236.65:22-176.126.103.184:60804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:15.158014 kernel: audit: type=1130 audit(1768597875.152:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-64.23.236.65:22-176.126.103.184:60804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:15.771568 sshd[3538]: Invalid user ubuntu from 176.126.103.184 port 60804 Jan 16 21:11:15.962000 audit[3538]: USER_ERR pid=3538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:15.964157 sshd[3538]: Connection closed by invalid user ubuntu 176.126.103.184 port 60804 [preauth] Jan 16 21:11:15.968984 kernel: audit: type=1109 audit(1768597875.962:902): pid=3538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:15.970136 systemd[1]: sshd@239-64.23.236.65:22-176.126.103.184:60804.service: Deactivated successfully. Jan 16 21:11:15.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-64.23.236.65:22-176.126.103.184:60804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:15.975178 kernel: audit: type=1131 audit(1768597875.969:903): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-64.23.236.65:22-176.126.103.184:60804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:16.179133 systemd[1]: Started sshd@240-64.23.236.65:22-176.126.103.184:60816.service - OpenSSH per-connection server daemon (176.126.103.184:60816). Jan 16 21:11:16.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-64.23.236.65:22-176.126.103.184:60816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:16.185104 kernel: audit: type=1130 audit(1768597876.178:904): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-64.23.236.65:22-176.126.103.184:60816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:16.810986 sshd[3544]: Invalid user ubuntu from 176.126.103.184 port 60816 Jan 16 21:11:17.004112 sshd[3544]: Connection closed by invalid user ubuntu 176.126.103.184 port 60816 [preauth] Jan 16 21:11:17.003000 audit[3544]: USER_ERR pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:17.007340 systemd[1]: sshd@240-64.23.236.65:22-176.126.103.184:60816.service: Deactivated successfully. Jan 16 21:11:17.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-64.23.236.65:22-176.126.103.184:60816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:17.011431 kernel: audit: type=1109 audit(1768597877.003:905): pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:17.011478 kernel: audit: type=1131 audit(1768597877.006:906): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-64.23.236.65:22-176.126.103.184:60816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:17.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-64.23.236.65:22-176.126.103.184:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:17.210368 systemd[1]: Started sshd@241-64.23.236.65:22-176.126.103.184:60820.service - OpenSSH per-connection server daemon (176.126.103.184:60820). Jan 16 21:11:17.216086 kernel: audit: type=1130 audit(1768597877.209:907): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-64.23.236.65:22-176.126.103.184:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:17.831208 sshd[3552]: Invalid user ubuntu from 176.126.103.184 port 60820 Jan 16 21:11:18.021022 sshd[3552]: Connection closed by invalid user ubuntu 176.126.103.184 port 60820 [preauth] Jan 16 21:11:18.020000 audit[3552]: USER_ERR pid=3552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:18.023490 systemd[1]: sshd@241-64.23.236.65:22-176.126.103.184:60820.service: Deactivated successfully. Jan 16 21:11:18.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-64.23.236.65:22-176.126.103.184:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:18.220138 systemd[1]: Started sshd@242-64.23.236.65:22-176.126.103.184:60826.service - OpenSSH per-connection server daemon (176.126.103.184:60826). Jan 16 21:11:18.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@242-64.23.236.65:22-176.126.103.184:60826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:18.835363 sshd[3558]: Invalid user ubuntu from 176.126.103.184 port 60826 Jan 16 21:11:19.025928 sshd[3558]: Connection closed by invalid user ubuntu 176.126.103.184 port 60826 [preauth] Jan 16 21:11:19.025000 audit[3558]: USER_ERR pid=3558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:19.028428 systemd[1]: sshd@242-64.23.236.65:22-176.126.103.184:60826.service: Deactivated successfully. Jan 16 21:11:19.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@242-64.23.236.65:22-176.126.103.184:60826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:19.228014 systemd[1]: Started sshd@243-64.23.236.65:22-176.126.103.184:60842.service - OpenSSH per-connection server daemon (176.126.103.184:60842). Jan 16 21:11:19.234064 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:11:19.234189 kernel: audit: type=1130 audit(1768597879.227:913): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-64.23.236.65:22-176.126.103.184:60842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:19.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-64.23.236.65:22-176.126.103.184:60842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:19.841290 sshd[3564]: Invalid user ubuntu from 176.126.103.184 port 60842 Jan 16 21:11:20.032443 sshd[3564]: Connection closed by invalid user ubuntu 176.126.103.184 port 60842 [preauth] Jan 16 21:11:20.031000 audit[3564]: USER_ERR pid=3564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:20.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-64.23.236.65:22-176.126.103.184:60842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:20.036421 systemd[1]: sshd@243-64.23.236.65:22-176.126.103.184:60842.service: Deactivated successfully. Jan 16 21:11:20.038523 kernel: audit: type=1109 audit(1768597880.031:914): pid=3564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:20.038591 kernel: audit: type=1131 audit(1768597880.035:915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-64.23.236.65:22-176.126.103.184:60842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:20.229899 systemd[1]: Started sshd@244-64.23.236.65:22-176.126.103.184:60848.service - OpenSSH per-connection server daemon (176.126.103.184:60848). Jan 16 21:11:20.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-64.23.236.65:22-176.126.103.184:60848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:20.235040 kernel: audit: type=1130 audit(1768597880.229:916): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-64.23.236.65:22-176.126.103.184:60848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:20.850811 sshd[3571]: Invalid user ubuntu from 176.126.103.184 port 60848 Jan 16 21:11:21.038938 sshd[3571]: Connection closed by invalid user ubuntu 176.126.103.184 port 60848 [preauth] Jan 16 21:11:21.038000 audit[3571]: USER_ERR pid=3571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:21.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-64.23.236.65:22-176.126.103.184:60848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:21.042504 systemd[1]: sshd@244-64.23.236.65:22-176.126.103.184:60848.service: Deactivated successfully. Jan 16 21:11:21.045684 kernel: audit: type=1109 audit(1768597881.038:917): pid=3571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:21.045795 kernel: audit: type=1131 audit(1768597881.041:918): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-64.23.236.65:22-176.126.103.184:60848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:21.242862 systemd[1]: Started sshd@245-64.23.236.65:22-176.126.103.184:60858.service - OpenSSH per-connection server daemon (176.126.103.184:60858). Jan 16 21:11:21.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-64.23.236.65:22-176.126.103.184:60858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:21.247992 kernel: audit: type=1130 audit(1768597881.242:919): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-64.23.236.65:22-176.126.103.184:60858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:21.862506 sshd[3579]: Invalid user ubuntu from 176.126.103.184 port 60858 Jan 16 21:11:22.051329 sshd[3579]: Connection closed by invalid user ubuntu 176.126.103.184 port 60858 [preauth] Jan 16 21:11:22.050000 audit[3579]: USER_ERR pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:22.055614 systemd[1]: sshd@245-64.23.236.65:22-176.126.103.184:60858.service: Deactivated successfully. Jan 16 21:11:22.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-64.23.236.65:22-176.126.103.184:60858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:22.060482 kernel: audit: type=1109 audit(1768597882.050:920): pid=3579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:22.060717 kernel: audit: type=1131 audit(1768597882.054:921): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-64.23.236.65:22-176.126.103.184:60858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:22.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@246-64.23.236.65:22-176.126.103.184:60210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:22.268489 systemd[1]: Started sshd@246-64.23.236.65:22-176.126.103.184:60210.service - OpenSSH per-connection server daemon (176.126.103.184:60210). Jan 16 21:11:22.274013 kernel: audit: type=1130 audit(1768597882.267:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@246-64.23.236.65:22-176.126.103.184:60210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:22.901535 sshd[3585]: Invalid user ubuntu from 176.126.103.184 port 60210 Jan 16 21:11:23.093990 sshd[3585]: Connection closed by invalid user ubuntu 176.126.103.184 port 60210 [preauth] Jan 16 21:11:23.093000 audit[3585]: USER_ERR pid=3585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:23.096404 systemd[1]: sshd@246-64.23.236.65:22-176.126.103.184:60210.service: Deactivated successfully. Jan 16 21:11:23.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@246-64.23.236.65:22-176.126.103.184:60210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:23.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@247-64.23.236.65:22-176.126.103.184:60218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:23.301725 systemd[1]: Started sshd@247-64.23.236.65:22-176.126.103.184:60218.service - OpenSSH per-connection server daemon (176.126.103.184:60218). Jan 16 21:11:23.922083 sshd[3591]: Invalid user ubuntu from 176.126.103.184 port 60218 Jan 16 21:11:24.114013 sshd[3591]: Connection closed by invalid user ubuntu 176.126.103.184 port 60218 [preauth] Jan 16 21:11:24.113000 audit[3591]: USER_ERR pid=3591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:24.116098 systemd[1]: sshd@247-64.23.236.65:22-176.126.103.184:60218.service: Deactivated successfully. Jan 16 21:11:24.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@247-64.23.236.65:22-176.126.103.184:60218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:24.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-64.23.236.65:22-176.126.103.184:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:24.315157 kernel: kauditd_printk_skb: 5 callbacks suppressed Jan 16 21:11:24.315189 kernel: audit: type=1130 audit(1768597884.312:928): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-64.23.236.65:22-176.126.103.184:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:24.313432 systemd[1]: Started sshd@248-64.23.236.65:22-176.126.103.184:60234.service - OpenSSH per-connection server daemon (176.126.103.184:60234). Jan 16 21:11:24.919438 sshd[3597]: Invalid user ubuntu from 176.126.103.184 port 60234 Jan 16 21:11:25.107930 sshd[3597]: Connection closed by invalid user ubuntu 176.126.103.184 port 60234 [preauth] Jan 16 21:11:25.107000 audit[3597]: USER_ERR pid=3597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:25.110596 systemd[1]: sshd@248-64.23.236.65:22-176.126.103.184:60234.service: Deactivated successfully. Jan 16 21:11:25.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-64.23.236.65:22-176.126.103.184:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:25.114777 kernel: audit: type=1109 audit(1768597885.107:929): pid=3597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:25.114843 kernel: audit: type=1131 audit(1768597885.110:930): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-64.23.236.65:22-176.126.103.184:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:25.323828 systemd[1]: Started sshd@249-64.23.236.65:22-176.126.103.184:60246.service - OpenSSH per-connection server daemon (176.126.103.184:60246). Jan 16 21:11:25.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-64.23.236.65:22-176.126.103.184:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:25.328983 kernel: audit: type=1130 audit(1768597885.323:931): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-64.23.236.65:22-176.126.103.184:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:25.946070 sshd[3603]: Invalid user ubuntu from 176.126.103.184 port 60246 Jan 16 21:11:26.138671 sshd[3603]: Connection closed by invalid user ubuntu 176.126.103.184 port 60246 [preauth] Jan 16 21:11:26.138000 audit[3603]: USER_ERR pid=3603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:26.144341 kernel: audit: type=1109 audit(1768597886.138:932): pid=3603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:26.146481 systemd[1]: sshd@249-64.23.236.65:22-176.126.103.184:60246.service: Deactivated successfully. Jan 16 21:11:26.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-64.23.236.65:22-176.126.103.184:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:26.152019 kernel: audit: type=1131 audit(1768597886.146:933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-64.23.236.65:22-176.126.103.184:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:26.344924 systemd[1]: Started sshd@250-64.23.236.65:22-176.126.103.184:60256.service - OpenSSH per-connection server daemon (176.126.103.184:60256). Jan 16 21:11:26.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-64.23.236.65:22-176.126.103.184:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:26.349988 kernel: audit: type=1130 audit(1768597886.344:934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-64.23.236.65:22-176.126.103.184:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:26.958696 sshd[3609]: Invalid user ubuntu from 176.126.103.184 port 60256 Jan 16 21:11:27.147193 sshd[3609]: Connection closed by invalid user ubuntu 176.126.103.184 port 60256 [preauth] Jan 16 21:11:27.146000 audit[3609]: USER_ERR pid=3609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:27.152694 systemd[1]: sshd@250-64.23.236.65:22-176.126.103.184:60256.service: Deactivated successfully. Jan 16 21:11:27.152973 kernel: audit: type=1109 audit(1768597887.146:935): pid=3609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:27.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-64.23.236.65:22-176.126.103.184:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:27.160099 kernel: audit: type=1131 audit(1768597887.152:936): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-64.23.236.65:22-176.126.103.184:60256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:27.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-64.23.236.65:22-176.126.103.184:60258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:27.355262 systemd[1]: Started sshd@251-64.23.236.65:22-176.126.103.184:60258.service - OpenSSH per-connection server daemon (176.126.103.184:60258). Jan 16 21:11:27.361080 kernel: audit: type=1130 audit(1768597887.354:937): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-64.23.236.65:22-176.126.103.184:60258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:27.982480 sshd[3615]: Invalid user ubuntu from 176.126.103.184 port 60258 Jan 16 21:11:28.176010 sshd[3615]: Connection closed by invalid user ubuntu 176.126.103.184 port 60258 [preauth] Jan 16 21:11:28.175000 audit[3615]: USER_ERR pid=3615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:28.179314 systemd[1]: sshd@251-64.23.236.65:22-176.126.103.184:60258.service: Deactivated successfully. Jan 16 21:11:28.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-64.23.236.65:22-176.126.103.184:60258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:28.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@252-64.23.236.65:22-176.126.103.184:60266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 16 21:11:28.377068 systemd[1]: Started sshd@252-64.23.236.65:22-176.126.103.184:60266.service - OpenSSH per-connection server daemon (176.126.103.184:60266). Jan 16 21:11:29.002246 sshd[3621]: Invalid user ubuntu from 176.126.103.184 port 60266 Jan 16 21:11:29.194035 sshd[3621]: Connection closed by invalid user ubuntu 176.126.103.184 port 60266 [preauth] Jan 16 21:11:29.193000 audit[3621]: USER_ERR pid=3621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/lib64/misc/sshd-session" hostname=176.126.103.184 addr=176.126.103.184 terminal=ssh res=failed' Jan 16 21:11:29.196543 systemd[1]: sshd@252-64.23.236.65:22-176.126.103.184:60266.service: Deactivated successfully. Jan 16 21:11:29.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@252-64.23.236.65:22-176.126.103.184:60266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'