2025/04/26 06:50:10 [error] 3302811#3302811: *6821 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 06:50:10 [error] 3302811#3302811: *6821 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 59.13.196.77, you should ban it for long time (honeypot form function-abuseipdb)" while reading response header from upstream, client: 59.13.196.77, server: www.elivecd.org, request: "GET / HTTP/1.0", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157:80"
... show less
2025/04/26 05:59:51 [error] 3282131#3282131: *5958 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 05:59:51 [error] 3282131#3282131: *5958 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 45.79.120.183, you should ban it for long time (honeypot form function-abuseipdb)" while reading response header from upstream, client: 45.79.120.183, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less
2025-04-26T05:52:59.430617+01:00 hostvu2 sshd[3292049]: Failed password for invalid user mori from 3 ... show more2025-04-26T05:52:59.430617+01:00 hostvu2 sshd[3292049]: Failed password for invalid user mori from 36.93.247.226 port 60662 ssh2
2025-04-26T05:55:35.662806+01:00 hostvu2 sshd[3292447]: Invalid user taller from 36.93.247.226 port 47416
2025-04-26T05:55:35.665100+01:00 hostvu2 sshd[3292447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.93.247.226
2025-04-26T05:55:37.596818+01:00 hostvu2 sshd[3292447]: Failed password for invalid user taller from 36.93.247.226 port 47416 ssh2
2025-04-26T05:57:58.198310+01:00 hostvu2 sshd[3292832]: Invalid user ubuntu from 36.93.247.226 port 56726
... show less
2025-04-26T05:49:55.371139+01:00 hostvu2 sshd[3291141]: Failed password for invalid user ander from ... show more2025-04-26T05:49:55.371139+01:00 hostvu2 sshd[3291141]: Failed password for invalid user ander from 96.78.175.36 port 49690 ssh2
2025-04-26T05:53:40.283821+01:00 hostvu2 sshd[3292071]: Invalid user mori from 96.78.175.36 port 52426
2025-04-26T05:53:40.287146+01:00 hostvu2 sshd[3292071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.36
2025-04-26T05:53:42.098556+01:00 hostvu2 sshd[3292071]: Failed password for invalid user mori from 96.78.175.36 port 52426 ssh2
2025-04-26T05:55:27.308867+01:00 hostvu2 sshd[3292436]: Invalid user flavia from 96.78.175.36 port 45690
... show less
2025/04/26 05:41:58 [error] 3282131#3282131: *5593 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 05:41:58 [error] 3282131#3282131: *5593 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 107.174.224.18, you should ban it for long time (honeypot form function-abuseipdb)" while reading response header from upstream, client: 107.174.224.18, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less
2025/04/26 05:37:34 [error] 3282131#3282131: *5525 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 05:37:34 [error] 3282131#3282131: *5525 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 130.0.26.114, url was 'hostvu2.elivecd.org' and abuseipdb '32', function: ELP_site_live" while reading response header from upstream, client: 130.0.26.114, server: www.elivecd.org, request: "POST / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "hostvu2.elivecd.org"
... show less
2025/04/26 04:53:55 [error] 3260620#3260620: *4625 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 04:53:55 [error] 3260620#3260620: *4625 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 186.94.181.185, url was '78.141.243.157' and abuseipdb '5', function: ELP_site_live" while reading response header from upstream, client: 186.94.181.185, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less
2025-04-26T04:38:28.377238+01:00 hostvu2 sshd[3268484]: Failed password for invalid user admin from ... show more2025-04-26T04:38:28.377238+01:00 hostvu2 sshd[3268484]: Failed password for invalid user admin from 117.33.156.107 port 50614 ssh2
2025-04-26T04:42:31.826623+01:00 hostvu2 sshd[3269452]: Invalid user guest from 117.33.156.107 port 46430
2025-04-26T04:42:31.830654+01:00 hostvu2 sshd[3269452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.156.107
2025-04-26T04:42:33.582668+01:00 hostvu2 sshd[3269452]: Failed password for invalid user guest from 117.33.156.107 port 46430 ssh2
2025-04-26T04:46:29.235678+01:00 hostvu2 sshd[3270245]: Invalid user ubuntu from 117.33.156.107 port 42246
... show less
2025-04-26T04:37:31.863677+01:00 hostvu2 sshd[3268147]: Invalid user minikube from 64.227.137.31 por ... show more2025-04-26T04:37:31.863677+01:00 hostvu2 sshd[3268147]: Invalid user minikube from 64.227.137.31 port 48970
2025-04-26T04:37:31.867750+01:00 hostvu2 sshd[3268147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.137.31
2025-04-26T04:37:33.433952+01:00 hostvu2 sshd[3268147]: Failed password for invalid user minikube from 64.227.137.31 port 48970 ssh2
2025-04-26T04:43:03.966103+01:00 hostvu2 sshd[3269458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.137.31 user=root
2025-04-26T04:43:06.110312+01:00 hostvu2 sshd[3269458]: Failed password for root from 64.227.137.31 port 36688 ssh2
... show less
2025-04-26T04:28:02.984534+01:00 hostvu2 sshd[3266347]: pam_unix(sshd:auth): authentication failure; ... show more2025-04-26T04:28:02.984534+01:00 hostvu2 sshd[3266347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.125.175.19
2025-04-26T04:28:05.438319+01:00 hostvu2 sshd[3266347]: Failed password for invalid user teamspeak from 179.125.175.19 port 44310 ssh2
2025-04-26T04:33:55.117441+01:00 hostvu2 sshd[3267421]: Invalid user ins from 179.125.175.19 port 59444
2025-04-26T04:33:55.119789+01:00 hostvu2 sshd[3267421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.125.175.19
2025-04-26T04:33:57.032284+01:00 hostvu2 sshd[3267421]: Failed password for invalid user ins from 179.125.175.19 port 59444 ssh2
... show less
2025-04-26T04:32:51.114159+01:00 hostvu2 sshd[3267380]: Invalid user ubnt from 160.19.79.72 port 193 ... show more2025-04-26T04:32:51.114159+01:00 hostvu2 sshd[3267380]: Invalid user ubnt from 160.19.79.72 port 19350
2025-04-26T04:32:51.598120+01:00 hostvu2 sshd[3267382]: Invalid user admin from 160.19.79.72 port 19366
2025-04-26T04:32:52.188654+01:00 hostvu2 sshd[3267386]: Invalid user usario from 160.19.79.72 port 19394
2025-04-26T04:32:52.229381+01:00 hostvu2 sshd[3267387]: Invalid user user from 160.19.79.72 port 19404
2025-04-26T04:32:53.020218+01:00 hostvu2 sshd[3267384]: Invalid user support from 160.19.79.72 port 19382
... show less
2025-04-26T04:21:05.377010+01:00 hostvu2 sshd[3265142]: pam_unix(sshd:auth): authentication failure; ... show more2025-04-26T04:21:05.377010+01:00 hostvu2 sshd[3265142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.254.32.62
2025-04-26T04:21:07.585266+01:00 hostvu2 sshd[3265142]: Failed password for invalid user jenkins from 162.254.32.62 port 47140 ssh2
2025-04-26T04:26:11.427308+01:00 hostvu2 sshd[3266271]: Invalid user user from 162.254.32.62 port 36002
2025-04-26T04:26:11.432000+01:00 hostvu2 sshd[3266271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.254.32.62
2025-04-26T04:26:13.314306+01:00 hostvu2 sshd[3266271]: Failed password for invalid user user from 162.254.32.62 port 36002 ssh2
... show less
2025-04-26T04:14:16.849230+01:00 hostvu2 sshd[3263844]: Failed password for invalid user ubuntu from ... show more2025-04-26T04:14:16.849230+01:00 hostvu2 sshd[3263844]: Failed password for invalid user ubuntu from 27.128.170.160 port 57322 ssh2
2025-04-26T04:19:31.079769+01:00 hostvu2 sshd[3264600]: Invalid user user from 27.128.170.160 port 54182
2025-04-26T04:19:31.085815+01:00 hostvu2 sshd[3264600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.170.160
2025-04-26T04:19:33.389361+01:00 hostvu2 sshd[3264600]: Failed password for invalid user user from 27.128.170.160 port 54182 ssh2
2025-04-26T04:24:46.188880+01:00 hostvu2 sshd[3265930]: Invalid user ubuntu from 27.128.170.160 port 49628
... show less
2025-04-26T04:13:03.162182+01:00 hostvu2 sshd[3263513]: Failed password for root from 218.92.0.231 p ... show more2025-04-26T04:13:03.162182+01:00 hostvu2 sshd[3263513]: Failed password for root from 218.92.0.231 port 40646 ssh2
2025-04-26T04:22:52.025511+01:00 hostvu2 sshd[3265555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root
2025-04-26T04:22:54.253860+01:00 hostvu2 sshd[3265555]: Failed password for root from 218.92.0.231 port 30786 ssh2
2025-04-26T04:22:58.681807+01:00 hostvu2 sshd[3265555]: Failed password for root from 218.92.0.231 port 30786 ssh2
2025-04-26T04:23:00.342309+01:00 hostvu2 sshd[3265555]: Failed password for root from 218.92.0.231 port 30786 ssh2
... show less
2025/04/26 04:17:12 [error] 3260620#3260620: *3933 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2025/04/26 04:17:12 [error] 3260620#3260620: *3933 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 44.200.28.234, you should ban it for long time (honeypot form function-abuseipdb)" while reading response header from upstream, client: 44.200.28.234, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less
2025-04-26T03:54:11.594905+01:00 hostvu2 sshd[3249893]: Failed password for invalid user bot from 51 ... show more2025-04-26T03:54:11.594905+01:00 hostvu2 sshd[3249893]: Failed password for invalid user bot from 51.79.4.11 port 50680 ssh2
2025-04-26T03:56:40.381562+01:00 hostvu2 sshd[3250378]: Invalid user minecraft from 51.79.4.11 port 47188
2025-04-26T03:56:40.466838+01:00 hostvu2 sshd[3250378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.4.11
2025-04-26T03:56:42.555103+01:00 hostvu2 sshd[3250378]: Failed password for invalid user minecraft from 51.79.4.11 port 47188 ssh2
2025-04-26T03:59:11.844985+01:00 hostvu2 sshd[3250796]: Invalid user ambari from 51.79.4.11 port 41054
... show less
2025-04-26T03:43:51.486673+01:00 hostvu2 sshd[3247592]: Failed password for invalid user apache from ... show more2025-04-26T03:43:51.486673+01:00 hostvu2 sshd[3247592]: Failed password for invalid user apache from 85.239.33.141 port 53334 ssh2
2025-04-26T03:44:19.490950+01:00 hostvu2 sshd[3247917]: Invalid user deploy from 85.239.33.141 port 53086
2025-04-26T03:44:19.547978+01:00 hostvu2 sshd[3247917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.33.141
2025-04-26T03:44:21.244504+01:00 hostvu2 sshd[3247917]: Failed password for invalid user deploy from 85.239.33.141 port 53086 ssh2
2025-04-26T03:44:48.733502+01:00 hostvu2 sshd[3247932]: Invalid user git from 85.239.33.141 port 36234
... show less
2025/04/26 02:43:57 [error] 3218320#3218320: *2145 FastCGI sent in stderr: "; PHP message: BOT WARNI ... show more2025/04/26 02:43:57 [error] 3218320#3218320: *2145 FastCGI sent in stderr: "; PHP message: BOT WARNING: visitor used the honeypot: 93.94.148.189, url was '78.141.243.157' and abuseipdb '15', function: ELP_site_live" while reading response header from upstream, client: 93.94.148.189, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less