Feb 14 06:05:04 np0005619687 useradd[999]: new group: name=cloud-user, GID=1001
Feb 14 06:05:04 np0005619687 useradd[999]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none
Feb 14 06:05:04 np0005619687 useradd[999]: add 'cloud-user' to group 'adm'
Feb 14 06:05:04 np0005619687 useradd[999]: add 'cloud-user' to group 'systemd-journal'
Feb 14 06:05:04 np0005619687 useradd[999]: add 'cloud-user' to shadow group 'adm'
Feb 14 06:05:04 np0005619687 useradd[999]: add 'cloud-user' to shadow group 'systemd-journal'
Feb 14 06:05:04 np0005619687 sshd[1017]: Server listening on 0.0.0.0 port 22.
Feb 14 06:05:04 np0005619687 sshd[1017]: Server listening on :: port 22.
Feb 14 06:05:05 np0005619687 sshd-session[1542]: Connection reset by 38.102.83.114 port 53454 [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1559]: Unable to negotiate with 38.102.83.114 port 32988: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1566]: Connection reset by 38.102.83.114 port 32994 [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1578]: Unable to negotiate with 38.102.83.114 port 33000: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1592]: Unable to negotiate with 38.102.83.114 port 33006: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1599]: Connection reset by 38.102.83.114 port 33022 [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1601]: Unable to negotiate with 38.102.83.114 port 33030: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1603]: Unable to negotiate with 38.102.83.114 port 33044: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth]
Feb 14 06:05:05 np0005619687 sshd-session[1597]: Connection closed by 38.102.83.114 port 33018 [preauth]
Feb 14 06:05:29 np0005619687 sshd-session[4795]: Accepted publickey for zuul from 38.102.83.114 port 53028 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8
Feb 14 06:05:29 np0005619687 systemd[4799]: pam_unix(systemd-user:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:05:29 np0005619687 sshd-session[4795]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:05:57 np0005619687 sudo[5729]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wajnuvfpklywtmviqzajxgtfccvywvzj ; /usr/bin/python3'
Feb 14 06:05:57 np0005619687 sudo[5729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:05:57 np0005619687 sudo[5729]: pam_unix(sudo:session): session closed for user root
Feb 14 06:05:57 np0005619687 sudo[5807]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-muxiddfvfxokdarhmtqtxntfkzaalgnv ; /usr/bin/python3'
Feb 14 06:05:57 np0005619687 sudo[5807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:05:57 np0005619687 sudo[5807]: pam_unix(sudo:session): session closed for user root
Feb 14 06:05:58 np0005619687 sudo[5880]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ghksqzcbkszpeaczhpinwnmevsigajxw ; /usr/bin/python3'
Feb 14 06:05:58 np0005619687 sudo[5880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:05:58 np0005619687 sudo[5880]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:07 np0005619687 sudo[6554]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uyucddqvdfkqxbchmgzlfoxsmizryklu ; /usr/bin/python3'
Feb 14 06:06:07 np0005619687 sudo[6554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:08 np0005619687 sudo[6554]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:08 np0005619687 sudo[6585]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fauhxjnlilozqwehnnxsahzyjduccdzv ; /usr/bin/python3'
Feb 14 06:06:08 np0005619687 sudo[6585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:08 np0005619687 sudo[6585]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:10 np0005619687 sudo[7005]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-trazgijtqdfiuypdfsflcfievvvxbpqz ; /usr/bin/python3'
Feb 14 06:06:10 np0005619687 sudo[7005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:10 np0005619687 sudo[7005]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:11 np0005619687 sudo[7078]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zftzzgnxephptozghjehvwezwqedkazq ; /usr/bin/python3'
Feb 14 06:06:11 np0005619687 sudo[7078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:11 np0005619687 sudo[7078]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:12 np0005619687 sudo[7232]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jaswpujcuichqjvmtwdolxisuetqfhbv ; /usr/bin/python3'
Feb 14 06:06:12 np0005619687 sudo[7232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:12 np0005619687 sudo[7232]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:12 np0005619687 sudo[7305]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tkdmfunlvxhqfysjmhlrhrwuwspdpcnm ; /usr/bin/python3'
Feb 14 06:06:12 np0005619687 sudo[7305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:12 np0005619687 sudo[7305]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:13 np0005619687 sudo[7356]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kzmcggclkevkqfozjnfxhlhalhdrfcyw ; /usr/bin/python3'
Feb 14 06:06:13 np0005619687 sudo[7356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:13 np0005619687 sudo[7356]: pam_unix(sudo:session): session closed for user root
Feb 14 06:06:36 np0005619687 sudo[7439]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fqtbspwbgmpdxfssxztyxciixaqzycib ; /usr/bin/python3'
Feb 14 06:06:36 np0005619687 sudo[7439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:06:36 np0005619687 sudo[7439]: pam_unix(sudo:session): session closed for user root
Feb 14 06:07:26 np0005619687 sudo[7549]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dzrvkjzerhfatyfukegmmlykxqrhkckz ; OS_CLOUD=vexxhost /usr/bin/python3'
Feb 14 06:07:26 np0005619687 sudo[7549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:07:26 np0005619687 sudo[7549]: pam_unix(sudo:session): session closed for user root
Feb 14 06:07:26 np0005619687 sudo[7622]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-njfuatcwhjxtftyaqfkdmzgefcjeyqxw ; OS_CLOUD=vexxhost /usr/bin/python3'
Feb 14 06:07:26 np0005619687 sudo[7622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:07:26 np0005619687 sudo[7622]: pam_unix(sudo:session): session closed for user root
Feb 14 06:07:27 np0005619687 sudo[7672]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dnvejmyqdpvtfktdeknbxufpyosbcvsv ; OS_CLOUD=vexxhost /usr/bin/python3'
Feb 14 06:07:27 np0005619687 sudo[7672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:07:28 np0005619687 sudo[7672]: pam_unix(sudo:session): session closed for user root
Feb 14 06:08:28 np0005619687 sshd-session[4808]: Received disconnect from 38.102.83.114 port 53028:11: disconnected by user
Feb 14 06:08:28 np0005619687 sshd-session[4808]: Disconnected from user zuul 38.102.83.114 port 53028
Feb 14 06:08:28 np0005619687 sshd-session[4795]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:08:37 np0005619687 sshd-session[7789]: error: kex_exchange_identification: read: Connection reset by peer
Feb 14 06:08:37 np0005619687 sshd-session[7789]: Connection reset by 176.120.22.52 port 60528
Feb 14 06:09:14 np0005619687 sshd-session[7790]: Accepted publickey for zuul from 38.102.83.114 port 51428 ssh2: RSA SHA256:ioL5JdRl7qLhqMzgshIXayUiOOUxFNQXG8Eg3Co7Hqc
Feb 14 06:09:14 np0005619687 sshd-session[7790]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:09:14 np0005619687 sudo[7869]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fnaosjotzkunhumiaapdpzxjlnngbihz ; OS_CLOUD=vexxhost /usr/bin/python3'
Feb 14 06:09:14 np0005619687 sudo[7869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:09:14 np0005619687 sudo[7869]: pam_unix(sudo:session): session closed for user root
Feb 14 06:09:14 np0005619687 sudo[7942]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pjjennknqkdcwkuytopgjbwshiwbwqdp ; OS_CLOUD=vexxhost /usr/bin/python3'
Feb 14 06:09:14 np0005619687 sudo[7942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:09:15 np0005619687 sudo[7942]: pam_unix(sudo:session): session closed for user root
Feb 14 06:09:19 np0005619687 sshd-session[7793]: Connection closed by 38.102.83.114 port 51428
Feb 14 06:09:19 np0005619687 sshd-session[7790]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:14:07 np0005619687 sshd-session[7974]: Accepted publickey for zuul from 38.102.83.114 port 46124 ssh2: RSA SHA256:ioL5JdRl7qLhqMzgshIXayUiOOUxFNQXG8Eg3Co7Hqc
Feb 14 06:14:08 np0005619687 sshd-session[7974]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:14:08 np0005619687 sudo[8001]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xohuhpcqjpbhpttvhhhkuiayotffezvi ; /usr/bin/python3'
Feb 14 06:14:08 np0005619687 sudo[8001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:08 np0005619687 sudo[8001]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:08 np0005619687 sudo[8030]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nktthivbtuqluccxulztrnjwhlzejogt ; /usr/bin/python3'
Feb 14 06:14:08 np0005619687 sudo[8030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:08 np0005619687 sudo[8030]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:08 np0005619687 sudo[8056]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-esjkxgeemteuoltdccqbhfpfbewmzmdv ; /usr/bin/python3'
Feb 14 06:14:08 np0005619687 sudo[8056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:08 np0005619687 sudo[8056]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:08 np0005619687 sudo[8082]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xsjjytimcjploomcsuavnghfeplrrgep ; /usr/bin/python3'
Feb 14 06:14:08 np0005619687 sudo[8082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:09 np0005619687 sudo[8082]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:09 np0005619687 sudo[8108]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-inahjkvmxrwyomzchulcdeshqndauhue ; /usr/bin/python3'
Feb 14 06:14:09 np0005619687 sudo[8108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:09 np0005619687 sudo[8108]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:09 np0005619687 sudo[8134]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zucfxncruaxdfyrkbligcouvgovbzrud ; /usr/bin/python3'
Feb 14 06:14:09 np0005619687 sudo[8134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:10 np0005619687 sudo[8134]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:10 np0005619687 sudo[8212]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-klhpbdberzrszqpuopcsowisggoqkdia ; /usr/bin/python3'
Feb 14 06:14:10 np0005619687 sudo[8212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:10 np0005619687 sudo[8212]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:10 np0005619687 sudo[8285]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zxhzyftpylyccgrlxgfqatdgakafugfo ; /usr/bin/python3'
Feb 14 06:14:10 np0005619687 sudo[8285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:11 np0005619687 sudo[8285]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:11 np0005619687 sudo[8335]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jwvneiiibnahcntqftamrxyihzgywbbg ; /usr/bin/python3'
Feb 14 06:14:11 np0005619687 sudo[8335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:12 np0005619687 sudo[8335]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:13 np0005619687 sudo[8398]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cxyidpyopoomrvhdupcivfpenjodwvcf ; /usr/bin/python3'
Feb 14 06:14:13 np0005619687 sudo[8398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:13 np0005619687 sudo[8398]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:14 np0005619687 sudo[8424]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zjrkmgzvwutcmpxxayolgjxvtslybuaf ; /usr/bin/python3'
Feb 14 06:14:14 np0005619687 sudo[8424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:14 np0005619687 sudo[8424]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:14 np0005619687 sudo[8452]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dlfsbkmkonvcivxmebrskkuhtrqqcnez ; /usr/bin/python3'
Feb 14 06:14:14 np0005619687 sudo[8452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:14 np0005619687 sudo[8452]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:14 np0005619687 sudo[8480]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aheppgtzqjdehnikmwluhmlfzrfybytq ; /usr/bin/python3'
Feb 14 06:14:14 np0005619687 sudo[8480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:14 np0005619687 sudo[8480]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:14 np0005619687 sudo[8508]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fvnqbzqealnytqrbwmdcmlwftqubbzpn ; /usr/bin/python3'
Feb 14 06:14:14 np0005619687 sudo[8508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:14:15 np0005619687 sudo[8508]: pam_unix(sudo:session): session closed for user root
Feb 14 06:14:18 np0005619687 sshd-session[7977]: Connection closed by 38.102.83.114 port 46124
Feb 14 06:14:18 np0005619687 sshd-session[7974]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:14:20 np0005619687 sshd-session[8573]: Accepted publickey for zuul from 38.102.83.114 port 36454 ssh2: RSA SHA256:ioL5JdRl7qLhqMzgshIXayUiOOUxFNQXG8Eg3Co7Hqc
Feb 14 06:14:20 np0005619687 sshd-session[8573]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:14:20 np0005619687 sudo[8600]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oyepvfhymyjcglxbwlnumjywbkyujfaz ; /usr/bin/python3'
Feb 14 06:14:20 np0005619687 sudo[8600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:06 np0005619687 sudo[8600]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:24 np0005619687 sudo[21554]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qkserjjamherfpzvbyfjbsclembfryqc ; /usr/bin/python3'
Feb 14 06:15:24 np0005619687 sudo[21554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:24 np0005619687 sudo[21554]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:25 np0005619687 sshd-session[8576]: Connection closed by 38.102.83.114 port 36454
Feb 14 06:15:25 np0005619687 sshd-session[8573]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:15:42 np0005619687 sshd-session[30004]: Connection closed by 38.102.83.9 port 41886 [preauth]
Feb 14 06:15:42 np0005619687 sshd-session[30007]: Connection closed by 38.102.83.9 port 41890 [preauth]
Feb 14 06:15:42 np0005619687 sshd-session[30001]: Unable to negotiate with 38.102.83.9 port 41898: no matching host key type found. Their offer: ssh-ed25519 [preauth]
Feb 14 06:15:42 np0005619687 sshd-session[30006]: Unable to negotiate with 38.102.83.9 port 41902: no matching host key type found. Their offer: sk-ecdsa-sha2-nistp256@openssh.com [preauth]
Feb 14 06:15:42 np0005619687 sshd-session[30008]: Unable to negotiate with 38.102.83.9 port 41914: no matching host key type found. Their offer: sk-ssh-ed25519@openssh.com [preauth]
Feb 14 06:15:46 np0005619687 sshd-session[30216]: Accepted publickey for zuul from 38.102.83.114 port 51536 ssh2: RSA SHA256:ioL5JdRl7qLhqMzgshIXayUiOOUxFNQXG8Eg3Co7Hqc
Feb 14 06:15:46 np0005619687 sshd-session[30216]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:15:47 np0005619687 sudo[30267]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ebyjofrokxnfjssqwvqnmcseykxuffxb ; /usr/bin/python3'
Feb 14 06:15:47 np0005619687 sudo[30267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:47 np0005619687 sudo[30267]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:48 np0005619687 sudo[30293]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uasdeairevgkzwxedwerbgsndonzkqmn ; /usr/bin/python3'
Feb 14 06:15:48 np0005619687 sudo[30293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:48 np0005619687 useradd[30297]: new group: name=cloud-admin, GID=1002
Feb 14 06:15:48 np0005619687 useradd[30297]: new user: name=cloud-admin, UID=1002, GID=1002, home=/home/cloud-admin, shell=/bin/bash, from=none
Feb 14 06:15:48 np0005619687 sudo[30293]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:48 np0005619687 sudo[30327]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ghypgsfmhkbiviiydxvtufjacljyvewh ; /usr/bin/python3'
Feb 14 06:15:48 np0005619687 sudo[30327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:48 np0005619687 sudo[30327]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:49 np0005619687 sudo[30405]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-smwsbkwskjxqocfmcyrxctfuqcsuinin ; /usr/bin/python3'
Feb 14 06:15:49 np0005619687 sudo[30405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:49 np0005619687 sudo[30405]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:49 np0005619687 sudo[30478]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ejeufaubrkblktqbxhsulkdudofpydje ; /usr/bin/python3'
Feb 14 06:15:49 np0005619687 sudo[30478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:49 np0005619687 sudo[30478]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:50 np0005619687 sudo[30528]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rpsflbzyuecrrosyzievdacxgtprwheu ; /usr/bin/python3'
Feb 14 06:15:50 np0005619687 sudo[30528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:15:50 np0005619687 sudo[30528]: pam_unix(sudo:session): session closed for user root
Feb 14 06:15:51 np0005619687 sshd-session[30219]: Connection closed by 38.102.83.114 port 51536
Feb 14 06:15:51 np0005619687 sshd-session[30216]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:19:26 np0005619687 sshd-session[30554]: Accepted publickey for zuul from 38.102.83.9 port 50048 ssh2: RSA SHA256:ioL5JdRl7qLhqMzgshIXayUiOOUxFNQXG8Eg3Co7Hqc
Feb 14 06:19:26 np0005619687 sshd-session[30554]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:19:29 np0005619687 sudo[30744]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wvxfjykpbvklpzqrfahawcliumrcfmmv ; /usr/bin/python3'
Feb 14 06:19:29 np0005619687 sudo[30744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:29 np0005619687 sudo[30744]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:29 np0005619687 sudo[30817]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qzfghzektbltthqxrmxndciirnjoxykv ; /usr/bin/python3'
Feb 14 06:19:29 np0005619687 sudo[30817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:29 np0005619687 sudo[30817]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:29 np0005619687 sudo[30843]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tvshjiqifprfymrwzejxkzkqhatmrwbl ; /usr/bin/python3'
Feb 14 06:19:29 np0005619687 sudo[30843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:30 np0005619687 sudo[30843]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:30 np0005619687 sudo[30916]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-spczyjhejmqqraqmxkfzwnumphqpivso ; /usr/bin/python3'
Feb 14 06:19:30 np0005619687 sudo[30916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:30 np0005619687 sudo[30916]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:30 np0005619687 sudo[30942]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xwznzuxmvuwetuhazlrvylwfpeakxqoy ; /usr/bin/python3'
Feb 14 06:19:30 np0005619687 sudo[30942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:30 np0005619687 sudo[30942]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:30 np0005619687 sudo[31015]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iljcziosmrwewuuqlcilcjqtckudcseb ; /usr/bin/python3'
Feb 14 06:19:30 np0005619687 sudo[31015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:30 np0005619687 sudo[31015]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:31 np0005619687 sudo[31041]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-awteivddjewtdhejneeylcclrwirdwih ; /usr/bin/python3'
Feb 14 06:19:31 np0005619687 sudo[31041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:31 np0005619687 sudo[31041]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:31 np0005619687 sudo[31114]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dglrrfeeseoheodtmlqnljygmlyktibq ; /usr/bin/python3'
Feb 14 06:19:31 np0005619687 sudo[31114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:31 np0005619687 sudo[31114]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:31 np0005619687 sudo[31140]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oiozziiibcegmtbciwfhzoqjpebhppux ; /usr/bin/python3'
Feb 14 06:19:31 np0005619687 sudo[31140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:31 np0005619687 sudo[31140]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:31 np0005619687 sudo[31213]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bcyzzhsrmyuowuucwgzzotgznvasgmoz ; /usr/bin/python3'
Feb 14 06:19:31 np0005619687 sudo[31213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:31 np0005619687 sudo[31213]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:32 np0005619687 sudo[31239]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oyzqxeqjoiiqtctrlrnqdkzjdtrvehnj ; /usr/bin/python3'
Feb 14 06:19:32 np0005619687 sudo[31239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:32 np0005619687 sudo[31239]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:32 np0005619687 sudo[31312]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nndzwvddgqhastswckzczbxmlzssibom ; /usr/bin/python3'
Feb 14 06:19:32 np0005619687 sudo[31312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:32 np0005619687 sudo[31312]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:32 np0005619687 sudo[31338]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fazkiompuuvsawidouthicpmprouzzsz ; /usr/bin/python3'
Feb 14 06:19:32 np0005619687 sudo[31338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:32 np0005619687 sudo[31338]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:32 np0005619687 sudo[31411]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rtsxtvwnfcocofwjhbwjoepjvxaeqfjo ; /usr/bin/python3'
Feb 14 06:19:32 np0005619687 sudo[31411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:19:33 np0005619687 sudo[31411]: pam_unix(sudo:session): session closed for user root
Feb 14 06:19:35 np0005619687 sshd-session[31438]: Connection closed by 192.168.122.11 port 33104 [preauth]
Feb 14 06:19:35 np0005619687 sshd-session[31439]: Unable to negotiate with 192.168.122.11 port 33138: no matching host key type found. Their offer: sk-ecdsa-sha2-nistp256@openssh.com [preauth]
Feb 14 06:19:35 np0005619687 sshd-session[31440]: Unable to negotiate with 192.168.122.11 port 33146: no matching host key type found. Their offer: sk-ssh-ed25519@openssh.com [preauth]
Feb 14 06:19:35 np0005619687 sshd-session[31443]: Connection closed by 192.168.122.11 port 33118 [preauth]
Feb 14 06:19:35 np0005619687 sshd-session[31442]: Unable to negotiate with 192.168.122.11 port 33130: no matching host key type found. Their offer: ssh-ed25519 [preauth]
Feb 14 06:24:44 np0005619687 sshd-session[30557]: Received disconnect from 38.102.83.9 port 50048:11: disconnected by user
Feb 14 06:24:44 np0005619687 sshd-session[30557]: Disconnected from user zuul 38.102.83.9 port 50048
Feb 14 06:24:44 np0005619687 sshd-session[30554]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:31:43 np0005619687 sshd-session[31478]: Accepted publickey for zuul from 192.168.122.30 port 59232 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:31:43 np0005619687 sshd-session[31478]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:31:46 np0005619687 sudo[31810]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ebptwujowpkpfqrcwnbwxdwrpeolpaja ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771068705.7267938-51-55950445642019/AnsiballZ_command.py'
Feb 14 06:31:46 np0005619687 sudo[31810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:31:52 np0005619687 sudo[31810]: pam_unix(sudo:session): session closed for user root
Feb 14 06:32:41 np0005619687 sshd-session[31870]: error: maximum authentication attempts exceeded for root from 92.33.220.216 port 47316 ssh2 [preauth]
Feb 14 06:32:41 np0005619687 sshd-session[31870]: Disconnecting authenticating user root 92.33.220.216 port 47316: Too many authentication failures [preauth]
Feb 14 06:32:43 np0005619687 sshd-session[31872]: error: maximum authentication attempts exceeded for root from 92.33.220.216 port 47678 ssh2 [preauth]
Feb 14 06:32:43 np0005619687 sshd-session[31872]: Disconnecting authenticating user root 92.33.220.216 port 47678: Too many authentication failures [preauth]
Feb 14 06:32:44 np0005619687 sshd-session[31874]: error: maximum authentication attempts exceeded for root from 92.33.220.216 port 48064 ssh2 [preauth]
Feb 14 06:32:44 np0005619687 sshd-session[31874]: Disconnecting authenticating user root 92.33.220.216 port 48064: Too many authentication failures [preauth]
Feb 14 06:32:46 np0005619687 sshd-session[31876]: Received disconnect from 92.33.220.216 port 48410:11: disconnected by user [preauth]
Feb 14 06:32:46 np0005619687 sshd-session[31876]: Disconnected from authenticating user root 92.33.220.216 port 48410 [preauth]
Feb 14 06:32:47 np0005619687 sshd-session[31878]: Invalid user admin from 92.33.220.216 port 48644
Feb 14 06:32:47 np0005619687 sshd-session[31878]: error: maximum authentication attempts exceeded for invalid user admin from 92.33.220.216 port 48644 ssh2 [preauth]
Feb 14 06:32:47 np0005619687 sshd-session[31878]: Disconnecting invalid user admin 92.33.220.216 port 48644: Too many authentication failures [preauth]
Feb 14 06:32:49 np0005619687 sshd-session[31880]: Invalid user admin from 92.33.220.216 port 49036
Feb 14 06:32:49 np0005619687 sshd-session[31880]: error: maximum authentication attempts exceeded for invalid user admin from 92.33.220.216 port 49036 ssh2 [preauth]
Feb 14 06:32:49 np0005619687 sshd-session[31880]: Disconnecting invalid user admin 92.33.220.216 port 49036: Too many authentication failures [preauth]
Feb 14 06:32:51 np0005619687 sshd-session[31882]: Invalid user admin from 92.33.220.216 port 49414
Feb 14 06:32:51 np0005619687 sshd-session[31882]: Received disconnect from 92.33.220.216 port 49414:11: disconnected by user [preauth]
Feb 14 06:32:51 np0005619687 sshd-session[31882]: Disconnected from invalid user admin 92.33.220.216 port 49414 [preauth]
Feb 14 06:32:53 np0005619687 sshd-session[31884]: Invalid user oracle from 92.33.220.216 port 49884
Feb 14 06:32:53 np0005619687 sshd-session[31884]: error: maximum authentication attempts exceeded for invalid user oracle from 92.33.220.216 port 49884 ssh2 [preauth]
Feb 14 06:32:53 np0005619687 sshd-session[31884]: Disconnecting invalid user oracle 92.33.220.216 port 49884: Too many authentication failures [preauth]
Feb 14 06:32:54 np0005619687 sshd-session[31887]: Invalid user oracle from 92.33.220.216 port 50218
Feb 14 06:32:55 np0005619687 sshd-session[31887]: error: maximum authentication attempts exceeded for invalid user oracle from 92.33.220.216 port 50218 ssh2 [preauth]
Feb 14 06:32:55 np0005619687 sshd-session[31887]: Disconnecting invalid user oracle 92.33.220.216 port 50218: Too many authentication failures [preauth]
Feb 14 06:32:57 np0005619687 sshd-session[31889]: Invalid user oracle from 92.33.220.216 port 50638
Feb 14 06:32:57 np0005619687 sshd-session[31889]: Received disconnect from 92.33.220.216 port 50638:11: disconnected by user [preauth]
Feb 14 06:32:57 np0005619687 sshd-session[31889]: Disconnected from invalid user oracle 92.33.220.216 port 50638 [preauth]
Feb 14 06:32:58 np0005619687 sshd-session[31891]: Invalid user usuario from 92.33.220.216 port 51002
Feb 14 06:32:59 np0005619687 sshd-session[31891]: error: maximum authentication attempts exceeded for invalid user usuario from 92.33.220.216 port 51002 ssh2 [preauth]
Feb 14 06:32:59 np0005619687 sshd-session[31891]: Disconnecting invalid user usuario 92.33.220.216 port 51002: Too many authentication failures [preauth]
Feb 14 06:33:00 np0005619687 sshd-session[31893]: Invalid user usuario from 92.33.220.216 port 51364
Feb 14 06:33:01 np0005619687 sshd-session[31893]: error: maximum authentication attempts exceeded for invalid user usuario from 92.33.220.216 port 51364 ssh2 [preauth]
Feb 14 06:33:01 np0005619687 sshd-session[31893]: Disconnecting invalid user usuario 92.33.220.216 port 51364: Too many authentication failures [preauth]
Feb 14 06:33:02 np0005619687 sshd-session[31895]: Invalid user usuario from 92.33.220.216 port 51694
Feb 14 06:33:02 np0005619687 sshd-session[31895]: Received disconnect from 92.33.220.216 port 51694:11: disconnected by user [preauth]
Feb 14 06:33:02 np0005619687 sshd-session[31895]: Disconnected from invalid user usuario 92.33.220.216 port 51694 [preauth]
Feb 14 06:33:03 np0005619687 sshd-session[31897]: Invalid user test from 92.33.220.216 port 52064
Feb 14 06:33:04 np0005619687 sshd-session[31897]: error: maximum authentication attempts exceeded for invalid user test from 92.33.220.216 port 52064 ssh2 [preauth]
Feb 14 06:33:04 np0005619687 sshd-session[31897]: Disconnecting invalid user test 92.33.220.216 port 52064: Too many authentication failures [preauth]
Feb 14 06:33:05 np0005619687 sshd-session[31899]: Invalid user test from 92.33.220.216 port 52332
Feb 14 06:33:06 np0005619687 sshd-session[31899]: error: maximum authentication attempts exceeded for invalid user test from 92.33.220.216 port 52332 ssh2 [preauth]
Feb 14 06:33:06 np0005619687 sshd-session[31899]: Disconnecting invalid user test 92.33.220.216 port 52332: Too many authentication failures [preauth]
Feb 14 06:33:07 np0005619687 sshd-session[31901]: Invalid user test from 92.33.220.216 port 52766
Feb 14 06:33:07 np0005619687 sshd-session[31901]: Received disconnect from 92.33.220.216 port 52766:11: disconnected by user [preauth]
Feb 14 06:33:07 np0005619687 sshd-session[31901]: Disconnected from invalid user test 92.33.220.216 port 52766 [preauth]
Feb 14 06:33:08 np0005619687 sshd-session[31903]: Invalid user user from 92.33.220.216 port 53034
Feb 14 06:33:09 np0005619687 sshd-session[31903]: error: maximum authentication attempts exceeded for invalid user user from 92.33.220.216 port 53034 ssh2 [preauth]
Feb 14 06:33:09 np0005619687 sshd-session[31903]: Disconnecting invalid user user 92.33.220.216 port 53034: Too many authentication failures [preauth]
Feb 14 06:33:10 np0005619687 sshd-session[31905]: Invalid user user from 92.33.220.216 port 53420
Feb 14 06:33:10 np0005619687 sshd-session[31905]: error: maximum authentication attempts exceeded for invalid user user from 92.33.220.216 port 53420 ssh2 [preauth]
Feb 14 06:33:10 np0005619687 sshd-session[31905]: Disconnecting invalid user user 92.33.220.216 port 53420: Too many authentication failures [preauth]
Feb 14 06:33:12 np0005619687 sshd-session[31907]: Invalid user user from 92.33.220.216 port 53794
Feb 14 06:33:12 np0005619687 sshd-session[31907]: Received disconnect from 92.33.220.216 port 53794:11: disconnected by user [preauth]
Feb 14 06:33:12 np0005619687 sshd-session[31907]: Disconnected from invalid user user 92.33.220.216 port 53794 [preauth]
Feb 14 06:33:13 np0005619687 sshd-session[31481]: Received disconnect from 192.168.122.30 port 59232:11: disconnected by user
Feb 14 06:33:13 np0005619687 sshd-session[31481]: Disconnected from user zuul 192.168.122.30 port 59232
Feb 14 06:33:13 np0005619687 sshd-session[31478]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:33:13 np0005619687 sshd-session[31909]: Invalid user ftpuser from 92.33.220.216 port 54034
Feb 14 06:33:14 np0005619687 sshd-session[31909]: error: maximum authentication attempts exceeded for invalid user ftpuser from 92.33.220.216 port 54034 ssh2 [preauth]
Feb 14 06:33:14 np0005619687 sshd-session[31909]: Disconnecting invalid user ftpuser 92.33.220.216 port 54034: Too many authentication failures [preauth]
Feb 14 06:33:15 np0005619687 sshd-session[31911]: Invalid user ftpuser from 92.33.220.216 port 54474
Feb 14 06:33:16 np0005619687 sshd-session[31911]: error: maximum authentication attempts exceeded for invalid user ftpuser from 92.33.220.216 port 54474 ssh2 [preauth]
Feb 14 06:33:16 np0005619687 sshd-session[31911]: Disconnecting invalid user ftpuser 92.33.220.216 port 54474: Too many authentication failures [preauth]
Feb 14 06:33:17 np0005619687 sshd-session[31913]: Invalid user ftpuser from 92.33.220.216 port 54806
Feb 14 06:33:17 np0005619687 sshd-session[31913]: Received disconnect from 92.33.220.216 port 54806:11: disconnected by user [preauth]
Feb 14 06:33:17 np0005619687 sshd-session[31913]: Disconnected from invalid user ftpuser 92.33.220.216 port 54806 [preauth]
Feb 14 06:33:18 np0005619687 sshd-session[31915]: Invalid user test1 from 92.33.220.216 port 55148
Feb 14 06:33:19 np0005619687 sshd-session[31915]: error: maximum authentication attempts exceeded for invalid user test1 from 92.33.220.216 port 55148 ssh2 [preauth]
Feb 14 06:33:19 np0005619687 sshd-session[31915]: Disconnecting invalid user test1 92.33.220.216 port 55148: Too many authentication failures [preauth]
Feb 14 06:33:20 np0005619687 sshd-session[31917]: Invalid user test1 from 92.33.220.216 port 55472
Feb 14 06:33:21 np0005619687 sshd-session[31917]: error: maximum authentication attempts exceeded for invalid user test1 from 92.33.220.216 port 55472 ssh2 [preauth]
Feb 14 06:33:21 np0005619687 sshd-session[31917]: Disconnecting invalid user test1 92.33.220.216 port 55472: Too many authentication failures [preauth]
Feb 14 06:33:22 np0005619687 sshd-session[31919]: Invalid user test1 from 92.33.220.216 port 55936
Feb 14 06:33:23 np0005619687 sshd-session[31919]: Received disconnect from 92.33.220.216 port 55936:11: disconnected by user [preauth]
Feb 14 06:33:23 np0005619687 sshd-session[31919]: Disconnected from invalid user test1 92.33.220.216 port 55936 [preauth]
Feb 14 06:33:24 np0005619687 sshd-session[31921]: Invalid user test2 from 92.33.220.216 port 56212
Feb 14 06:33:24 np0005619687 sshd-session[31921]: error: maximum authentication attempts exceeded for invalid user test2 from 92.33.220.216 port 56212 ssh2 [preauth]
Feb 14 06:33:24 np0005619687 sshd-session[31921]: Disconnecting invalid user test2 92.33.220.216 port 56212: Too many authentication failures [preauth]
Feb 14 06:33:26 np0005619687 sshd-session[31923]: Invalid user test2 from 92.33.220.216 port 56578
Feb 14 06:33:27 np0005619687 sshd-session[31923]: error: maximum authentication attempts exceeded for invalid user test2 from 92.33.220.216 port 56578 ssh2 [preauth]
Feb 14 06:33:27 np0005619687 sshd-session[31923]: Disconnecting invalid user test2 92.33.220.216 port 56578: Too many authentication failures [preauth]
Feb 14 06:33:28 np0005619687 sshd-session[31925]: Invalid user test2 from 92.33.220.216 port 57050
Feb 14 06:33:28 np0005619687 sshd-session[31925]: Received disconnect from 92.33.220.216 port 57050:11: disconnected by user [preauth]
Feb 14 06:33:28 np0005619687 sshd-session[31925]: Disconnected from invalid user test2 92.33.220.216 port 57050 [preauth]
Feb 14 06:33:29 np0005619687 sshd-session[31927]: Invalid user ubuntu from 92.33.220.216 port 57318
Feb 14 06:33:30 np0005619687 sshd-session[31927]: error: maximum authentication attempts exceeded for invalid user ubuntu from 92.33.220.216 port 57318 ssh2 [preauth]
Feb 14 06:33:30 np0005619687 sshd-session[31927]: Disconnecting invalid user ubuntu 92.33.220.216 port 57318: Too many authentication failures [preauth]
Feb 14 06:33:31 np0005619687 sshd-session[31929]: Invalid user ubuntu from 92.33.220.216 port 57712
Feb 14 06:33:32 np0005619687 sshd-session[31929]: error: maximum authentication attempts exceeded for invalid user ubuntu from 92.33.220.216 port 57712 ssh2 [preauth]
Feb 14 06:33:32 np0005619687 sshd-session[31929]: Disconnecting invalid user ubuntu 92.33.220.216 port 57712: Too many authentication failures [preauth]
Feb 14 06:33:33 np0005619687 sshd-session[31931]: Invalid user ubuntu from 92.33.220.216 port 58054
Feb 14 06:33:34 np0005619687 sshd-session[31931]: Received disconnect from 92.33.220.216 port 58054:11: disconnected by user [preauth]
Feb 14 06:33:34 np0005619687 sshd-session[31931]: Disconnected from invalid user ubuntu 92.33.220.216 port 58054 [preauth]
Feb 14 06:33:35 np0005619687 sshd-session[31933]: Invalid user pi from 92.33.220.216 port 58386
Feb 14 06:33:35 np0005619687 sshd-session[31933]: Received disconnect from 92.33.220.216 port 58386:11: disconnected by user [preauth]
Feb 14 06:33:35 np0005619687 sshd-session[31933]: Disconnected from invalid user pi 92.33.220.216 port 58386 [preauth]
Feb 14 06:33:36 np0005619687 sshd-session[31935]: Invalid user baikal from 92.33.220.216 port 58682
Feb 14 06:33:36 np0005619687 sshd-session[31935]: Received disconnect from 92.33.220.216 port 58682:11: disconnected by user [preauth]
Feb 14 06:33:36 np0005619687 sshd-session[31935]: Disconnected from invalid user baikal 92.33.220.216 port 58682 [preauth]
Feb 14 06:34:10 np0005619687 sshd-session[31938]: Accepted publickey for zuul from 192.168.122.30 port 35586 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:34:10 np0005619687 sshd-session[31938]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:34:12 np0005619687 sudo[32270]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ocgpqmnxodwxwejqdkbaikwqhzsahccf ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771068852.1946635-51-257145505300805/AnsiballZ_command.py'
Feb 14 06:34:12 np0005619687 sudo[32270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:34:18 np0005619687 sudo[32270]: pam_unix(sudo:session): session closed for user root
Feb 14 06:35:39 np0005619687 sshd-session[31941]: Received disconnect from 192.168.122.30 port 35586:11: disconnected by user
Feb 14 06:35:39 np0005619687 sshd-session[31941]: Disconnected from user zuul 192.168.122.30 port 35586
Feb 14 06:35:39 np0005619687 sshd-session[31938]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:36:44 np0005619687 sshd-session[32329]: Accepted publickey for zuul from 192.168.122.30 port 42492 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:36:44 np0005619687 sshd-session[32329]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:36:46 np0005619687 sudo[32661]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bwdjxpxikdxuvlldcayzqyuiukfzreww ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771069006.0365138-51-198988080824/AnsiballZ_command.py'
Feb 14 06:36:46 np0005619687 sudo[32661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:36:52 np0005619687 sudo[32661]: pam_unix(sudo:session): session closed for user root
Feb 14 06:38:12 np0005619687 sshd-session[32332]: Received disconnect from 192.168.122.30 port 42492:11: disconnected by user
Feb 14 06:38:12 np0005619687 sshd-session[32332]: Disconnected from user zuul 192.168.122.30 port 42492
Feb 14 06:38:12 np0005619687 sshd-session[32329]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:39:40 np0005619687 sshd-session[32865]: Accepted publickey for zuul from 192.168.122.30 port 55396 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:39:40 np0005619687 sshd-session[32865]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:39:42 np0005619687 sudo[33197]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xiiekcgrweyhefqdjldfsjbntzpehgin ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771069181.6509082-51-19319214863384/AnsiballZ_command.py'
Feb 14 06:39:42 np0005619687 sudo[33197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:39:48 np0005619687 sudo[33197]: pam_unix(sudo:session): session closed for user root
Feb 14 06:41:08 np0005619687 sshd-session[32868]: Received disconnect from 192.168.122.30 port 55396:11: disconnected by user
Feb 14 06:41:08 np0005619687 sshd-session[32868]: Disconnected from user zuul 192.168.122.30 port 55396
Feb 14 06:41:08 np0005619687 sshd-session[32865]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:43:15 np0005619687 sshd-session[33257]: Accepted publickey for zuul from 192.168.122.30 port 57138 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:43:15 np0005619687 sshd-session[33257]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:43:27 np0005619687 sudo[33589]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eeszrdyqngbopjznqznbdpzfofjbjhbf ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771069407.2309692-51-106491311562749/AnsiballZ_command.py'
Feb 14 06:43:27 np0005619687 sudo[33589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:43:34 np0005619687 sudo[33589]: pam_unix(sudo:session): session closed for user root
Feb 14 06:44:54 np0005619687 sshd-session[33260]: Received disconnect from 192.168.122.30 port 57138:11: disconnected by user
Feb 14 06:44:54 np0005619687 sshd-session[33260]: Disconnected from user zuul 192.168.122.30 port 57138
Feb 14 06:44:54 np0005619687 sshd-session[33257]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:48:21 np0005619687 sshd-session[33649]: Accepted publickey for zuul from 192.168.122.30 port 51360 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:48:21 np0005619687 sshd-session[33649]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:48:23 np0005619687 sudo[33981]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ywjqrgoszaxtmoisijrmethbitsjgwpe ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771069703.1640825-51-32783227155341/AnsiballZ_command.py'
Feb 14 06:48:23 np0005619687 sudo[33981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:48:30 np0005619687 sudo[33981]: pam_unix(sudo:session): session closed for user root
Feb 14 06:49:50 np0005619687 sshd-session[33652]: Received disconnect from 192.168.122.30 port 51360:11: disconnected by user
Feb 14 06:49:50 np0005619687 sshd-session[33652]: Disconnected from user zuul 192.168.122.30 port 51360
Feb 14 06:49:50 np0005619687 sshd-session[33649]: pam_unix(sshd:session): session closed for user zuul
Feb 14 06:55:56 np0005619687 sshd-session[34043]: Accepted publickey for zuul from 192.168.122.30 port 33240 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 06:55:56 np0005619687 sshd-session[34043]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 06:55:58 np0005619687 sudo[34375]:    zuul : TTY=pts/0 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zcgtwlarnalgvrlkhzszfsbqwrbqcbhj ; /usr/bin/python3.9 /home/zuul/.ansible/tmp/ansible-tmp-1771070158.0688732-51-274237511635400/AnsiballZ_command.py'
Feb 14 06:55:58 np0005619687 sudo[34375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
Feb 14 06:56:05 np0005619687 sudo[34375]: pam_unix(sudo:session): session closed for user root
Feb 14 06:57:26 np0005619687 sshd-session[34046]: Received disconnect from 192.168.122.30 port 33240:11: disconnected by user
Feb 14 06:57:26 np0005619687 sshd-session[34046]: Disconnected from user zuul 192.168.122.30 port 33240
Feb 14 06:57:26 np0005619687 sshd-session[34043]: pam_unix(sshd:session): session closed for user zuul
Feb 14 07:31:22 np0005619687 sshd-session[34467]: Accepted publickey for zuul from 192.168.122.10 port 50870 ssh2: ECDSA SHA256:vQSh8rQoEd23M06OWFnLY5WRG4E2+tYG+XXUXt6nsXs
Feb 14 07:31:22 np0005619687 sshd-session[34467]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by zuul(uid=0)
Feb 14 07:31:22 np0005619687 sudo[34471]:    zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/bash -c 'rm -rf /var/tmp/sos-osp && mkdir /var/tmp/sos-osp && sos report --batch --all-logs --tmp-dir=/var/tmp/sos-osp  -p container,openstack_edpm,system,storage,virt'
Feb 14 07:31:22 np0005619687 sudo[34471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000)
